Threats and Vulnerabilities
Threat Actor Classifications
Script Kiddies/Unskilled Attackers
- Characteristics: Limited technical knowledge, uses existing tools
- Motivation: Recognition, curiosity
- Threat Level: Low to moderate
- Countermeasures: Basic security controls often sufficient
Hacktivists
- Characteristics: Moderate to high technical skill
- Motivation: Political/social activism
- Methods: Website defacement, DDoS attacks, data leaks
- Notable Groups: Anonymous, various national groups
Organized Crime/Cybercriminals
- Characteristics: High technical skill, well-resourced
- Motivation: Financial gain
- Methods: Ransomware, financial fraud, identity theft
- Evolution: Ransomware-as-a-Service (RaaS) models
Nation-State/Advanced Persistent Threats (APT)
- Characteristics: Highest skill level, state-sponsored
- Motivation: Espionage, strategic advantage, disruption
- Methods: Zero-day exploits, supply chain attacks
- Timeline: Long-term, persistent campaigns
Insider Threats
- Types:
- Malicious: Intentional harm by authorized users
- Negligent: Accidental security breaches
- Compromised: External actors using insider credentials
- Detection: User behavior analytics (UBA)
Vulnerability Management
Common Vulnerabilities and Exposures (CVE)
- Purpose: Standardized vulnerability identification
- Format: CVE-YYYY-NNNN (e.g., CVE-2024-1234)
- Source: MITRE Corporation
- Usage: Vulnerability scanners, patch management
Common Vulnerability Scoring System (CVSS)
- Score Range: 0.0 (no risk) to 10.0 (critical)
- Severity Ratings:
- None: 0.0
- Low: 0.1-3.9
- Medium: 4.0-6.9
- High: 7.0-8.9
- Critical: 9.0-10.0
- Components: Base, Temporal, Environmental metrics
Common Weakness Enumeration (CWE)
- Purpose: Categorizes software vulnerabilities
- Structure: Hierarchical weakness taxonomy
- Top 25: Annual list of most dangerous software weaknesses
- Integration: Maps to CVE entries for root cause analysis
Zero-Day Vulnerabilities
- Definition: Unknown vulnerabilities with no available patches
- Timeline:
- Zero-day: Vulnerability unknown to defenders
- N-day: Known vulnerability, patch available
- 1-day: Recently patched vulnerability
- Detection: Behavioral analysis, AI/ML systems
Found this guide helpful? Share it with your team:
Share on LinkedIn