Exam Objectives 2.1
Compare and contrast common threat actors and motivations.
- Threat actors:
- Nation state: Government-backed cyber operatives
- Unskilled attacker: Novice with limited hacking skills
- Hacktivist: Activist hacker with political or social agenda
- Insider threat: Trusted insider posing cybersecurity risks
- Organized crime: Criminal group seeking financial gain via cybercrime
- Shadow IT: Unauthorized, unregulated tech use within an organization
- Attributes of actors:
- Internal/external: Originating from within or outside an entity
- Resources/funding: Availability of financial and technological support
- Sophistication/capability: Level of expertise and technological proficiency
- Motivations:
- Data exfiltration: Stealing sensitive data for illicit purposes
- Espionage: Gathering information for intelligence or competitive advantage
- Service disruption: Disrupting systems or services intentionally
- Blackmail: Extortion using compromising information
- Financial gain: Profiting from cybercriminal...