1.5 Explain different threat actor, vectors and intelligence sources Flashcards
Someone who takes action.
Actor
A potential harm.
Threat
The person or entity who is responsible for causing any security violating incidents.
Threat actor
An attacker who is operating on behalf of their country’s government, military, or other powerful leadership.
State actor/ nation-state hacker
Someone who uses their hacking skills for a cause or purpose.
Hacktivist
Threat actors who are less knowledgeable than a professional skilled attacker.
Script kiddies
Someone skilled and knowledgeable in a system.
Hacker
An ethical hacker or skilled IT professional.
Authorized hacker
A criminal or malicious attacker.
Unauthorized hacker
Possibly a reformed criminal or a skilled IT professional operating undercover to perform ethical hacking.
Semi-authorized hacker
A term used to describe the IT components deployed by a department without the knowledge or permission of senior management or the IT group.
Shadow IT
Threat and attack vectors
Direct access, wireless, networking, email, supply chain, social media, people, removable media, mobile devices, IoT, embedded devices, remote access, and cloud.
The collection of information about threat actors and the threats they represent.
Threat intelligence sources
The gathering of information from any publicly available resource.
Open-source intelligence (OSINT)
The part of the Internet which is not accessible by a standard Internet connection.
Dark web