Identify types of threat agents.
Identification should include, but not be limited to,
- script kiddies
- unskilled attackers who lack the ability to discover new vulnerabilities or write exploit code
- dependent on existing scripts or code
- predominate goals include creating havoc
- hacktivists
- seek to bring attention to a social or political cause
- often seeking vengeance for perceived political or societal wrongdoing
- skills can range from script kiddies to professional and/or sophisticated hackers
- malicious insiders
- a disgruntled insider with access and knowledge of an organization and systems
- often seeking personal gain
- employees who accidentally introduce malware into systems
- criminal enterprises
- attackers target systems for monetary gain
- often use spam, phishing, and spyware/malware to commit identity theft and online fraud
- international corporate spies and organized crime organizations conduct industrial espionage and large-scale monetary theft
- hire or develop hacker talent
- competitors or rogue corporations
- an organization that engages in hacking against competitors
- intention of stealing intellectual property or gaining financial competitive advantages
- nation-state sponsored or advanced persistent threats (APT)
- ideological militants
- intent is to weaken, disrupt, or destroy a target
- may conduct espionage for attack purposes, technology advancement, and/or disruption of infrastructure.
Process/Skill Questions:
- What is a threat agent?
- What are types of threat agents?
- How are these threat agents able to initiate a cyberattack?
- What are recent examples of corporate cyberattacks?