Module 2: Threat Actor Types

Ace your homework & exams now with Quizwiz!

hackers

- access protected information - seek attention and thrills - seek financial, political, or social rewards.

Nation States

The days of protecting systems from a lone attacker or small group are gone. In today's world, we have to deal with attacks from other countries. And these are some of the most dangerous external attacks you will face. - execute highly targeted attacks - extremely motivated attackers - use the most sophisticated techniques - have many resources - cannot be stopped, but you can recognize attacks

do damage--for example, leak sensitive information or destroy important data. Targeted attacks almost always use unknown exploits and go to great lengths to cover their tracks and hide their presence. Targeted attacks also use completely new programs written from the ground up that are specifically designed for the target.

The main goal of a targeted attack is to

internal and external

There are two tactics used in corporate espionage.

external

This is where the competitor hires a spy to attack a company from the outside by exploiting any vulnerabilities that exist and, again, returns the information to their client.

targeted attack

is much more dangerous and, to be completely honest, impossible to defend against. is extremely methodical and often carried out by multiple entities that have substantial resources.

opportunistic attack

is typically automated and involves scanning a wide range of systems for known vulnerabilities, such as old software, exposed ports, poorly secured networks, default configurations, and so on. When one is found, the attacker will exploit the vulnerability, steal what they need, and get out. (Automated attack that scans for vulnerabilities)

Opportunistic Attack

the threat actor is almost always trying to make money as fast as possible and with minimal effort. And because hiding your tracks and presence is very time-consuming, the attacker usually won't bother. They simply want to get in, grab the goods, and get out--think of it as the smash-and-grab of cyber attacks. (Easily make money) (Get in and out quickly)

competitor

this threat actor carries out attacks on behalf of an organization and targets competing companies. For example, a payment processing company could hire someone to carry out a DDoS attack on a competing payment processing company to force users to choose the attacker's product. The motive behind such attacks could be financial gain, competitor defamation, or even stealing industry secrets.

white hat hacker

this threat agent is actually, a good guy who tries to help a company see the vulnerabilities that exist in their security.

ransomware. An attacker will gain access to a system, plant a virus that encrypts all user data, and demand a payment for decrypting the data.

A common example of an opportunistic attack is

internal

In this case, a competitor hires a spy that gets a job at your company. This new--œemployee--then exploits any vulnerabilities and steals information for their client.

a customer, a janitor, or even a security guard. But most of the time, we are talking about an employee. And employees pose one of the biggest threats to any organization.

Now, when we say insider, we can be talking about

It's still beneficial to protect your network and minimize your attack surface as much as possible to make it that much harder for an attacker to succeed.

Even though targeted attacks are next to impossible to protect against, it doesn't mean you should throw in the towel.

Insiders

are one of the most dangerous types of threat actors. And often, they are the most overlooked.

script kiddie

aren't hackers in the traditional sense. they are kind of like the kids of the hacking world. will use applications or scripts written by much more talented individuals to attack systems or compromise devices.

to follow security best practices: keep systems up to date, close all unused ports, disable unused services, et cetera.

best way to protect against opportunistic attacks

unintentional threat actor

sometimes, an employee can become a threat actor without them even knowing. They create security breaches doing what they think is harmless day-to-day work. And an unintentional threat actor is the most common insider threat.

Cybercriminals

there's actually a subcategory of hacker threat agents, and they could even be grouped with corporate spies. , and they have some unique aspects that differentiate them from an average hacker. - take ricks and use extreme tactics - sell and use information - sometimes seek revenge often associated with large criminal organizations

hackers

this threat agent term is kind of a broad, generic term that tends to be applied to many different categories of threat agents. But generally speaking, and for our purposes here, it is any threat agent who uses their technical knowledge to bypass security, exploit a vulnerability, and gain access to protected information.


Related study sets

DSST Fundamentals of Counseling Practice Test 2

View Set

chapter 11 written correspondence

View Set

Security + New Questions Topic 2, Compliance and Operational Security

View Set

A&P II: Lecture Exam 3: Notes 6: Pulmonary Ventilation

View Set

Clinical Medicine II Exam 6 - Cardiology Part 2

View Set