Threat Actors and Motivations Flashcards

1
Q

What are threat actors?

A

Individuals or groups causing harm to digital systems intentionally. EX: Nation-states, unskilled attackers, hacktivists, insider threats, organized crime, shadow IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are cybercriminals?

A

Individuals engaging in criminal activities for financial gain or other malicious purposes within the cyber domain. EX: Malware developers, fraudsters, identity thieves, ransomware operators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are hackers?

A

Individuals with technical skills to compromise computer systems or networks. The term is neutral and can refer to ethical hackers as well. EX: Ethical hackers, black hat hackers, white hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of threat actors are nation-states?

A

Governments or state-sponsored entities engaged in cyber activities for political, economic, or military advantages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of threat actors are unskilled attackers?

A

Individuals with limited technical expertise but still capable of causing significant harm through simple yet effective methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kind of threat actors are hacktivists?

A

Activists who leverage hacking techniques to advance their social, political, or environmental agendas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of threat actors are insider threats?

A

Individuals within an organization who exploit their access and privileges for malicious purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of threat actors are organized crime?

A

Criminal groups seeking financial gain through cyber activities like fraud, extortion, or ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of threat actors are shadow IT?

A

Employees or departments using unauthorized software or systems, often unknowingly exposing vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some threat actor characteristics of nation-states?

A

Highly sophisticated and often well-funded. Engage in cyber activities for political, economic, or military advantages. May use advanced persistent threats (APTs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some threat actor characteristics of unskilled attackers?

A

Individuals with limited technical expertise. Rely on simple but effective methods. Can still cause significant harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some threat actor characteristics of hacktivists?

A

Motivated by social, political, or environmental causes. Use hacking techniques to advance their agendas or raise awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some threat actor characteristics of insider threats?

A

Individuals within an organization. Exploit their access and privileges for malicious purposes. Can be employees or contractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some threat actor characteristics of organized crime?

A

Criminal groups seeking financial gain through cyber activities. Often involved in activities like fraud, extortion, or ransomware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some threat actor characteristics of shadow IT?

A

Employees or departments using unauthorized software or systems without IT approval. Often unintentionally expose vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary distinguishing factor between cybercriminals and hackers in the context of cybersecurity?

17
Q

What type of threat actors are funded by the state, access to significant resources and advanced tools?

A

Nation-states

18
Q

What type of threat actors may use readily available tools, relying on low-cost or free resources?

A

Unskilled attackers

19
Q

What type of threat actors may rely on community support, crowdfunding, or voluntary contributions?

A

Hacktivists

20
Q

What type of threat actors have access to organizational resources, may leverage insider knowledge?

A

Insider threats

21
Q

What type of threat actors are funded by criminal activities, often well-organized with financial backing?

A

Organized crime

22
Q

What type of threat actors may operate on a small scale without significant formal funding?