002. Cybersecurity Threat Landscape



(1) The Hats Hackers Wear


(i) White-hat hackers


: Authorized attackers, who act with authorization and seek to discover security vulnerabilities with the intent of correcting them.


(ii) Black-hat hackers


: Unauthorized attackers with malicious intent


(iii) Gray-hat hackers


: Semi-authorized attackers, who fall somewhere between white- and black-hat hackers


(2) Threat Actors


(i) Unskilled attackers


: Script kiddie, who use hacking techniques but have limited skills.


(ii) Hacktivists


: Hackers, who use hacking techniques to accomplish some activist goal.


(iii) Organized Crime


: Organized crime appears in any case where there is money to be made


: Cyber-dependent crime, Child sexual abuse material, Online fraud, Dark web activity, Cross-cutting crime factors


(iv) Nation-State attackers


: Nation-State attackers hack into either foreign governments or corporations.


: APTs (Advanced Persistent Threats)