Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Section 3.1 Threat Actors

As you study this section, answer the following questions:

  • What are the three types of hackers?
  • What is an advanced persistent threat?
  • How are tactics, techniques, and procedures (TTPs) important to cybersecurity?

In this section, you will learn to:

  • Identify the different threat actor types
  • Identify the different threat classifications
  • Determine the different tactics, techniques, and procedures used by threat actors

The key terms for this section include:

Threat Actors and Their Descriptions
Threat Actor Type Description
HackerA hacker is a type of threat actor who gains unauthorized access to computer systems or networks. They aim to exploit system vulnerabilities for personal gain, theft, or other malicious purposes.
Nation-stateA nation-state hacker works for a government and attempts to gain top-secret information by hacking other governments.
HacktivistA hacktivist's primary purpose is to protest and express views and opinions. Hacktivists often deface websites or use denial-of-service attacks.
Criminal organizationCriminal organizations have transitioned many of their operations to a virtual setting. The internet provides various targets and options for obscuring their actions.
Internal-intentionalInternal-intentional threats can include employees, vendors, or contractors who use their network access to access confidential information or hinder data or systems availability.
Internal-unintentionalInternal-unintentional threats are usually a result of a lack of training or laziness. Although these insiders do not intend to cause harm, their actions could result in unintentionally weakened security points that could be used by intentional attackers.
Third-party vendorIf a third-party vendor has access to an organization’s system and data, it could be a security risk. The vendor could intentionally or unintentionally cause harm to the organization by compromising its systems or stealing sensitive information.
Advanced persistent threat (APT)An advanced persistent threat (APT) is a sophisticated type of cyber attack that involves a prolonged and targeted effort to compromise a specific target.
Script kiddieA script kiddie is a hacker lacking the technical skills to create their own programs or exploit vulnerabilities. Instead, they rely on pre-existing tools and scripts to launch attacks, often seeking to cause damage or disruption for personal gain or notoriety.

This section helps you prepare for the following certification exam objectives:

Exam Objective
CompTIA CySA+ CS0-0031.4 Compare and contrast threat-intelligence and threat-hunting concepts
  • Threat actors
    • Advanced persistent threat (APT)
    • Hacktivists
    • Organized crime
    • Nation-state
    • Script kiddie
    • Insider threat
      • Intentional
      • Unintentional
    • Supply chain
TestOut CyberDefense Pro

4.1 Manage security incidents

  • Eradicate Advanced Persistent Threats (APT)

3.1.1 Threat Actor Types

Click one of the buttons to take you to that part of the video.

Threat Actor Types 00:00-00:13 In this video, we'll discuss threat actors. A threat actor is a person or organization that threatens another person's or organization's security.

Hacker Types 00:13-00:28 Let's break down the threat actor types even more by looking at their motivations. Hackers almost always have unethical, malicious intentions. Some hackers are motivated by religious or political beliefs. Others are motivated by greed, blackmail, or revenge.

Hacktivist 00:28-00:43 A hacktivist often targets government agencies or corporations to protest their actions. Hacktivists are most known for defacing websites and executing denial-of-service attacks. Their main purpose is to protest and campaign for public attention.

Nation-State Hacker 00:43-01:04 A nation state hacker works for a government and attempts to gain top-secret information by hacking other governments' devices. Many nations have invested in the development of their cybersecurity presence and are willing to use this presence to reach their political or economic goals. Election systems, energy grids, intelligence agencies, and other critical systems are common targets.

Criminal Organizations 01:04-01:32 Criminal organizations have also transitioned much of their operations to the virtual setting. The internet provides a wider range of targets and provides additional options for covering their tracks. Because criminals are often targeting individuals in different jurisdictions, prosecution can be very difficult.

A threat actor doesn't necessarily have to be an outside hacker. They could be an internal threat, or even someone who causes a security vulnerability through negligence.

Internal Threats 01:32-02:20 Intentional internal threats could include employees, vendors, or contractors that use their network access to access confidential information or to hinder the availability of data or systems. The motivations for these insiders could include competitiveness, greed, or grievances against the organization. They could be acting on their own accord, or they could be recruited by an outsider.

Unintentional threats are usually a result of a lack of training or laziness. Although they don't intend to cause harm, their actions could result in unintentional weakened security points that could be used by external attackers. The best network security systems can be rendered practically useless if employees don't know how to use them effectively. Security training is critical for employees at all levels of an organization.

Summary 02:20-02:35 That's it for this lesson. In this video, we discussed threat actor types. such as hacktivists, nation state hackers, criminal organizations, and internal threats.

3.1.2 Threat Actor Type Facts

This lesson covers threat actors.

Threat Actors

Threat actors are individuals or groups who exploit network or system vulnerabilities. They attempt to gain unauthorized access to sensitive data, disrupt operations, or extract financial gain.

These actors may include:

TypeDescription
HackerA hacker is a type of threat actor who gains unauthorized access to computer systems or networks. They aim to exploit system vulnerabilities for personal gain, theft, or other malicious purposes. Hackers may use a variety of tactics and techniques, including malware, phishing attacks, or social engineering, to exploit weaknesses in a system's defenses.
Hackers are classified into three different categories:
  • An authorized hacker is a skilled hacker who only uses skills and knowledge for defensive purposes. An authorized hacker interacts only with a system to which explicit permission to access has been granted. These are ethical hackers.
  • An unauthorized hacker is also very skilled but uses knowledge and skills for illegal or malicious purposes. An unauthorized hacker is also known as a cracker. Unauthorized hackers are highly unethical.
  • A semi-authorized hacker falls in the middle of authorized and unauthorized hackers. The semi-authorized hacker may cross the line of what is ethical but usually has good intentions and is not driven by malicious intent.
Nation-stateA nation-state hacker works for a government and attempts to gain top-secret information by hacking other governments.
HacktivistA hacktivist's primary purpose is to protest and express views and opinions. Hacktivists often deface websites or use denial-of-service attacks.
Criminal organizationCriminal organizations have transitioned many of their operations to a virtual setting. The internet provides various targets and options for obscuring their actions. Because criminals often target individuals in multiple jurisdictions, prosecution can be difficult.
Internal-intentionalInternal-intentional threats can include employees, vendors, or contractors who use their network access to access confidential information, or hinder data or systems availability. The insiders' motivations could be competitiveness, greed, or grievances against the organization. They could be acting on their own accord or recruited by someone on the outside.
Internal-unintentionalInternal-unintentional threats are usually a result of a lack of training or laziness. Although these insiders do not intend to cause harm, their actions could result in unintentionally weakened security points that could be used by intentional attackers. The best network security systems can be rendered useless if employees do not know how to use them effectively. Security training is critical for employees at all levels of an organization.
Third-party vendorIf a third-party vendor has access to an organization’s system and data, it could be a security risk. The vendor could intentionally or unintentionally cause harm to the organization by compromising its systems or stealing sensitive information.
Advanced persistent threat (APT)An advanced persistent threat (APT) is a sophisticated type of cyber attack that involves a prolonged and targeted effort to compromise a specific target. APTs are typically undertaken by state-sponsored groups or other highly skilled actors. They can involve multiple stages, including reconnaissance, initial exploitation, and long-term data exfiltration.
Script kiddieA script kiddie is a hacker lacking the technical skills to create their own programs or exploit vulnerabilities. Instead, they rely on pre-existing tools and scripts to launch attacks, often seeking to cause damage or disruption for personal gain or notoriety.

3.1.3 Threat Classifications Facts

This lesson covers threat classification.

Threat Classification

The following table describes four types of threat classifications:

Classification Description
Known threatsKnown threats are threats you have information about and can prepare for.
Unknown threatsUnknown threats exploit security weaknesses you do not have information about and can only prepare for in a very general way.
Advanced persistent threatsThe term advanced persistent threat (APT) describes the behavior underpinning advanced cyber adversaries, such as nation-states and organized crime groups. APT originally referred to the group behind a campaign but has been widened to describe the tools these groups use. The concept of an APT helps to model threats. Besides basic scanning for virus or Trojan signatures, scanning for the presence of command and control (C&C or C2) software and unusual network activity are also essential actions. One of the defining characteristics of an APT is anti-forensics, where the adversary removes evidence of the attack.

APTs typically target large organizations, such as financial institutions, companies in healthcare, and other organizations that store large volumes of personally identifiable information (PII), when the PII describes important government and political figures. Historically, APTs have been observed targeting governments to carry out political objectives, interfere in elections, or spy on another country. As APT groups are identified and profiled, they are assigned unique number identifiers and code names. Government agencies and security researchers often refer to the same group using different names, and members of one group often participate in many others.

The "advanced" part of an APT is a crucial identifier, as these types of threats are rarely executed by lone attackers using publicly available exploits or exploit frameworks (such as Metasploit). APT threat groups can access considerable financial and personnel resources, including teams specializing in custom exploit development and execution. APTs spend significant time gathering intelligence on their targets to develop particular exploits. APT groups often combine many different attack elements into a carefully planned and orchestrated attack that may unfold over several months or longer.

APTs have diverse overall goals, but since a significant focus of their attack activities includes custom software development and stealth, most APTs are interested in maintaining access—or persistence—to networks and systems. Because of this, APTs are some of the most notorious and harmful threats to organizations and governments.
Last Updated:
Next
3.2 Threat Intelligence