Characteristics of cyber security threat actor types
The motivations of attackers
Different types of threat actors
Script kiddies - hack for reputation, proving their skill
Hacktivists
Criminal syndicates
Advanced persistent threats
Insiders
Competitors
Zero-day attacks
Zero-days are security issues that have zero days passed since the threat has been known. APT-s often conduct their own research and get zero-days.
Shadow IT
The situation is when people search and get the tools unapproved from the organization for the purpose of being more productive. This means the business means are not being met by the enterprise IT team.
Threat vectors
Email and social media
Direct access
Wireless networks
* Can be accessed from the parking lot
Removable media
* Drop cheap devices and wait for them to be plugged in
Cloud
* Attackers scan for publicly accessible cloud resources
Third-party risks
* Supply chain
About Threat data and intelligence
Assessing Threat Intelligence
STIX
TAXII
TTPs
OpenIOC
* Similar to STIX