Chapter_2
Chapter_2
Chapter 2
OBJECTIVES COVERED
Level of sophistication/
Internal vs. external
capability
Characteristics that
differentiate cybersecurity
threat actors
Resources/funding Intent/motivation
THREAT ACTORS
Unskilled Attackers
• Sometimes called script kiddies, a derogatory term
for people who use hacking techniques but have
limited skills
• Script kiddies can be a real threat because simplistic
hacking tools are freely available on the Internet and
they are plentiful and unfocused in their work
Hacktivists
• People who use hacking techniques to accomplish
some activist goal.
• The motivations, skill levels, and resources of
hacktivists vary widely.
• There are some organized group of hacktivists, such
as the hacking group Anonymous
ORGANIZED CRIME
Cyber-dependent crim
Cybercrime categories
Child sexual exploitation
Payment fraud
Dark web
Terrorism
Political Economic
Motivation Motivation
INSIDERS
Message-based
Removable Devices
Cloud
Supply Chain
THREAT DATA AND
INTELLIGENCE
OPEN-SOURCE INTELLIGENCE
PROPRIETARY AND CLOSED-SOURCE
INTELLIGENCE
ASSESSING THREAT INTELLIGENCE
STIX
TAXII OpenIOC
PUBLIC AND PRIVATE INFORMATION
SHARING CENTERS