Profiling Cyber Attackers

Cyber attackers come in different shapes and sizes; different goals, capabilities, risk tolerance etc. As defenders protecting the enterprise, the network or data in our software systems, it’s well worth the effort to understand the different characteristics of those who may attack us. Armed with that knowledge, we can identify which malefactors may be interested in our systems, and equip ourselves for defense.

The matrix below (an excerpt from Securing Systems by Brook Schoenfield) provides a good summary of the current threat agent landscape.

Threat AgentGoalsRisk ToleranceWork FactorMethods
CybercriminalsFinancialLowLow to mediumKnown Proven
Industrial SpiesInformation and disruptionLowHigh to extremeSophisticated and unique
HacktivistsInformation, disruption, and media attentionMedium to highLow to mediumSystem administration, errors, and social engineering
Hackers/ Script KiddiesMedia attentionHighLowKnown Proven
InsidersInformation and FinancialVery lowNil to lowSystem administration
Nation stateInformation and disruptionVery lowExtremeVery sophisticated

Leave a reply:

Your email address will not be published.

Time limit exceeded. Please complete the captcha once again.