

Threat Vectors: This a path or means by which threat actors gain access to a computer system by exploiting a vulnerability. However, they can also be associated with any of the groups mentioned earlier and work as an insider providing them with information on the company and getting them access to the company’s network from the inside. Insider Threats are individuals that work inside of a company and are usually disgruntled employees looking for revenge. They usually rely on publicly available exploits that require little technical skill for their cyber attacks and don’t usually have a lasting effect on their targets. Hacktivist, terrorist groups, thrill-seekers and script kiddies are considered moderate to low level in terms of sophistication. Nation state actors are usually the most sophisticated with huge amounts of resources supplied by their governments and have relationships with private sector companies and leverage organized crime groups to accomplish their goals. Nation-state and organized crime groups are generally the most organized and the most capable of carrying out large scale and long lasting cyber attacks, they are generally referred to as advanced persistent threats (APTs). Some threat actors are much more dangerous than others because of their level of resources, planning and coordination.

Here are some of the most common types of threat actors: Threat actors can be categorized by their motivations and to some extent their level of sophistication. Within cybersecurity this usually means they are looking to target private corporations or governments with a cyber attack for financial, military or political gain. Threat Actor: A threat actor is a state, group or individual that has malicious intent. Neither method is 100% more effective than the other but they are just different means to accomplish the same goal. Additionally, it can be done from an asset perspective, where you identify what assets are important to your company, look at all the ways you can find for that asset to be compromised and then come up with security controls to prevent that from happening. Threat modeling can be done from an attacker’s perspective, where you gather information on what methods hackers are using to attack companies similar to your own and then plan your countermeasures for those methods. Threat modeling is a proactive process of identifying the risks and threats that are likely to affect your organization and then planning and implementing countermeasures to prevent those threats from negatively affecting the company.
