Cybersecurity: Sources Threats (Beginners)

 




 1-   The four dimensions of the cyber threat  

A cyber threat is always composed of 4 main elements:

  • ·        An attacker or a group of attackers with various profiles.
  • ·        One or more objectives corresponding to the attacker's motivations.
  • ·        A target (person, organization, etc.) which may be a victim's information system and/or targeted data.
  • ·        A cyberattack or modus operandi that refers to the steps and operations that the attacker carries out to achieve his objective.


    2- The main attacker profiles  

 

Amateurs, with no particular skills (known as "script-kiddies") are attackers with little expertise. They most often use tools available on the internet and easily downloadable. Their motivation is playful, recreational ("to have fun").

 

"Vengeful" or "malicious" attackers, often isolated, whose motivation is personal or even emotional. For example, a rematch against

a former employer.

 

Cyberhacktivists (a fusion of hacker and activist), i.e. any type of attacker acting according to ideological, political, etc

 

Experienced strikers whose motivation is essentially technical.

 

Organized cybercriminals and mercenaries working for themselves or someone else's criminal organization. Their motivation is mainly lucrative (financial).


State actors, often endowed with significant resources and with multiple motivations. They can be of a nature strategic interests, depending on the interests of a State and may sometimes to pursue an offensive design.

 

3   3- The objectives of the attackers  

 

The challenge, the fun, aimed at achieving a feat for the sake of social recognition, challenge or simple fun. Even if the objective is essentially playful, this guy can have serious consequences for the victim.

 

Cybercrime for profit refers to attacks aimed at obtaining a financial benefit from malicious cyber activities. E.g.: the unlawful collection of bank details, etc.

 

Influence, the agitation consisting of acting on the field of information, often at the initiative of cyberhacktivists: hijacking accounts on social networks, defacement of websites, etc.

 

The objective of espionage is to exfiltrate strategic information, industrial or state secrets.

 

Strategic pre-positioning consists of discreetly positioning oneself in a computer network without the desire to act immediately, for example to prepare a future attack, without the purpose being always obvious.

 

Obstruction of the operation, by sabotage operations, neutralization refers to attacks whose objective is to making an information system and data unavailable, through saturation (for example, "denial of information" attacks). service" that can make a website or "ransomware" inaccessible) or even by physical destruction hardware (e.g., deceiving measuring instruments at a critical infrastructure operator's facility to prevent alarm mechanisms from triggering and lead to system destruction).

 

4  4-   The young hoodie: The not-so-common profile ...

 


The cyber attacker is often described in movies and media as a "hacker" who is a lone "kid" wearing a hoodie and acting late at night to "hack the CIA" from his bedroom computer.

 

-         If the isolated striker acting from his room is indeed a real category, it is a caricature, negligible in terms of impact. The reality of the threat today is more that of groups professional strikers, acting on their working hours.

-         The term "hacker" is, moreover, wrongly associated only with malicious actors. However, historically, it refers to a positive culture of "resourcefulness", "sharing" and "improvement” infields such as computer science but also electronics, carpentry, mechanics, etc. For the sake of distinguishing from the actors malicious people, we now speak of "ethical hackers".