002. Cybersecurity Threat Landscape
(1) The Hats Hackers Wear
(i) White-hat hackers
: Authorized attackers, who act with authorization and seek to discover security vulnerabilities with the intent of correcting them.
(ii) Black-hat hackers
: Unauthorized attackers with malicious intent
(iii) Gray-hat hackers
: Semi-authorized attackers, who fall somewhere between white- and black-hat hackers
(2) Threat Actors
(i) Unskilled attackers
: Script kiddie, who use hacking techniques but have limited skills.
(ii) Hacktivists
: Hackers, who use hacking techniques to accomplish some activist goal.
(iii) Organized Crime
: Organized crime appears in any case where there is money to be made
: Cyber-dependent crime, Child sexual abuse material, Online fraud, Dark web activity, Cross-cutting crime factors
(iv) Nation-State attackers
: Nation-State attackers hack into either foreign governments or corporations.
: APTs (Advanced Persistent Threats)