Cybersecurity Fundamentals: Threats, Attacks, and Defenses
Posted by Anonymous and classified in Technology
Written on in
English with a size of 7.65 KB
Threat Actors: Who Are the Attackers?
| Threat Actor | Motivation | Traits | Examples |
|---|---|---|---|
| Nation-State Hackers | Espionage, cyber warfare | Highly skilled, stealthy, well-funded | Fancy Bear (Russia), APT Groups |
| Organized Crime Groups | Financial gain (ransomware, theft) | Professional, use Ransomware-as-a-Service | Conti ransomware gang |
| Hacktivists | Ideological or political disruption | Varied skill levels | Anonymous |
| Insider Threats | Revenge, profit, carelessness | Already have access, dangerous | Disgruntled employees stealing data |
| Script Kiddies | Fun, curiosity, fame | Unskilled, use pre-made hacking tools | Individuals using automated exploit kits |
| Shadow IT | Convenience, speed | Employees using unauthorized tech | Unapproved cloud apps in a workplace |
Threat Vectors: How Attacks Occur
| Threat Vector | How It Works | Examples |
|---|---|---|
| Message- |