02 - Explaining Threat Actors and Threat Intelligence
02 - Explaining Threat Actors and Threat Intelligence
1
Outlines
• Risk
✓is the likelihood and impact (or consequence) of a threat actor exploiting a
vulnerability.
✓To assess risk, you identify a vulnerability and then evaluate the likelihood of it being
exploited by a threat and the impact that a successful exploit would have.
Security+ (SY0-601) © netriders.academy 6
ATTRIBUTES OF THREAT ACTORS
• Internal/External
✓An external threat actor or agent is one that has no account or authorized access to
the target system.
✓A malicious external threat must infiltrate the security system using malware and/or
social engineering.
✓Note that an external actor may perpetrate an attack remotely or on-premises (by
breaking into the company's headquarters, for instance).
✓It is the threat actor that is defined as external, rather than the attack method.
✓Conversely, an internal (or insider) threat actor is one that has been granted
permissions on the system.
✓This typically means an employee, but insider threat can also arise from contractors
and business partners.
• Intent/Motivation
✓Intent describes what an attacker hopes to achieve from the attack, while
motivation is the attacker's reason for perpetrating the attack.
✓A malicious threat actor could be motivated by greed, curiosity, or some sort of
grievance, for instance.
✓The intent could be to vandalize and disrupt a system or to steal something.
✓Malicious intents and motivations can be contrasted with accidental or unintentional
threat actors and agents.
✓Unintentional threat actors represents accidents, oversights, and other mistakes.