A threat actor is an entity responsible for an event that negatively impacts the security of others. They are often referred to as malicious actors due to their harmful actions.
Origin: External (Government-backed)
Resources: Extensive
Sophistication: High
Motivation: Espionage, disruption, political reasons
Origin: External (or Internal)
Resources: Limited
Sophistication: Low
Motivation: Disruption, personal gain
Origin: External (or Internal)
Resources: Moderate
Sophistication: Medium to High
Motivation: Political or ideological activism
Origin: Internal
Resources: High
Sophistication: Medium
Motivation: Revenge, financial gain, espionage
Origin: External
Resources: High
Sophistication: High
Motivation: Financial gain
Origin: Internal
Resources: Limited to Moderate
Sophistication: Low to Medium
Motivation: Bypassing IT policies for convenience
Threat Actor | Origin | Resources | Sophistication | Motivation |
---|---|---|---|---|
Nation-State (APT) | External (Government) | Extensive | High | Espionage, disruption, political reasons |
Unskilled Attackers (Script Kiddies) | External (or Internal) | Limited | Low | Disruption, personal gain |
Hacktivists | External (or Internal) | Moderate | Medium to High | Political or ideological activism |
Insider Threats | Internal | High | Medium | Revenge, financial gain, espionage |
Organized Crime | External | High | High | Financial gain |
Shadow IT | Internal | Limited to Moderate | Low to Medium | Bypassing IT policies for convenience |
By understanding the origin, resources, sophistication, and motivation of threat actors, organizations can tailor their security measures to better protect their systems from attacks.