Systems and Security : Attacks, Threats, and Vulnerabilities
1.5 Threat Actors, Vectors and Intelligence Sources
"Actors and threats" refer to the individuals, organizations or entities who pose a risk to the security of an information system.
Advanced Persistent Threat (APT): refers to a highly skilled and well-resourced attacker who aims to maintain a long-term presence in a target's network, while stealing sensitive information or compromising critical systems.
Insider Threats: refers to individuals who have access to sensitive information due to their employment within an organization. These individuals may cause harm to the organization either intentionally or unintentionally, either through malice or due to poor security practices.
State actors: refers to nation-states or government organizations that have the resources and capability to launch complex cyber attacks.
Hacktivists: refers to individuals or groups who use hacking techniques to promote political or social causes.
Script kiddies: refers to individuals who use existing, pre-written scripts or tools to launch attacks without having a deep understanding of the underlying technology.
Criminal syndicates: refers to groups of cybercriminals who work together to launch large-scale, organized cyber attacks for financial gain.
Hackers - Authorized - Unauthorized - Semi-authorized
Hackers can be broadly categorized into three types: Authorized, Unauthorized, and Semi-authorized.
Authorized hackers, also known as ethical hackers, are individuals who are employed by organizations to identify and test the security weaknesses of their systems and networks. They work with the permission of the organization and are tasked with improving the overall security posture of the organization.