1 00:00:06,770 --> 00:00:08,530 - Let's go over what are threat actors? 2 00:00:08,530 --> 00:00:10,642 Right. So threat actors, bad actors 3 00:00:10,642 --> 00:00:13,040 or malicious actors, you know, all these are 4 00:00:13,040 --> 00:00:15,340 different names that basically mean the same thing. 5 00:00:15,340 --> 00:00:17,670 Other folks actually call them attackers 6 00:00:17,670 --> 00:00:19,700 but the industry is actually standardizing 7 00:00:19,700 --> 00:00:23,970 in the word or the, you know, name, threat actor. 8 00:00:23,970 --> 00:00:26,437 So the threat actors are individuals 9 00:00:26,437 --> 00:00:30,170 or a group of individuals that perform an attacks 10 00:00:30,170 --> 00:00:32,960 or responsible for a acute scene incident 11 00:00:32,960 --> 00:00:35,472 that impacts or actually has the potential 12 00:00:35,472 --> 00:00:38,990 of impacting an organization or an individual, right? 13 00:00:38,990 --> 00:00:41,850 So there are several types of threat actors 14 00:00:41,850 --> 00:00:43,420 and here are actually including, 15 00:00:43,420 --> 00:00:44,915 you know, a few examples. 16 00:00:44,915 --> 00:00:47,210 First one is actually script kiddies, 17 00:00:47,210 --> 00:00:50,310 And these are people who uses assistance scripts 18 00:00:50,310 --> 00:00:52,390 you know, thus, the words, script kitties, 19 00:00:52,390 --> 00:00:53,223 or, you know 20 00:00:53,223 --> 00:00:55,810 different tools to actually hack into computers 21 00:00:55,810 --> 00:00:56,940 and to networks. 22 00:00:56,940 --> 00:00:57,800 And actually, you know 23 00:00:57,800 --> 00:01:00,020 they actually lack the expertise, right. 24 00:01:00,020 --> 00:01:03,260 To write their own software, their own exploits. 25 00:01:03,260 --> 00:01:05,440 So basically actually use somebody else's 26 00:01:05,440 --> 00:01:10,130 and you see these very often for either, 27 00:01:10,130 --> 00:01:11,680 you know, kids, you know 28 00:01:11,680 --> 00:01:14,440 nowadays actually launching the denial service attacks 29 00:01:14,440 --> 00:01:17,530 you know, and using specific tools or, you know 30 00:01:17,530 --> 00:01:19,635 individuals that are somewhat 31 00:01:19,635 --> 00:01:21,208 quote unquote amateurs, right. 32 00:01:21,208 --> 00:01:24,440 That, that, that they actually want to perform, 33 00:01:24,440 --> 00:01:27,210 you know either malicious or, you know 34 00:01:27,210 --> 00:01:30,380 an illicit activity using somebody else's script 35 00:01:30,380 --> 00:01:31,213 right? 36 00:01:31,213 --> 00:01:33,820 Now we also have organized crime groups. 37 00:01:33,820 --> 00:01:36,210 Right. And the main purpose 38 00:01:36,210 --> 00:01:39,210 of these groups is actually to steal information, 39 00:01:39,210 --> 00:01:42,060 scam people, and make money, right? 40 00:01:42,060 --> 00:01:45,150 And there are many different organized crime 41 00:01:45,150 --> 00:01:49,700 groups that are, you know cyber threat actors 42 00:01:49,700 --> 00:01:52,014 that make a lot of money nowadays. 43 00:01:52,014 --> 00:01:56,665 And this is actually an unfortunate reality that the cyber 44 00:01:56,665 --> 00:02:00,482 you know, economy, what we call the cyber economy 45 00:02:00,482 --> 00:02:02,890 you know, scamming people, stealing information. 46 00:02:02,890 --> 00:02:05,780 This means, you know, credit card information 47 00:02:05,780 --> 00:02:08,680 medical records, social security numbers 48 00:02:08,680 --> 00:02:12,150 identity of people, and many others, you know 49 00:02:12,150 --> 00:02:15,550 this is actually a huge business nowadays. 50 00:02:15,550 --> 00:02:18,720 Even with the now very popular, you know 51 00:02:18,720 --> 00:02:21,510 set of exploits at malware called ransomware. 52 00:02:21,510 --> 00:02:22,343 right? 53 00:02:22,343 --> 00:02:25,680 So these organized crimes actually making a lot of money 54 00:02:25,680 --> 00:02:29,080 and there's also state sponsor and governments, 55 00:02:29,080 --> 00:02:29,913 right. 56 00:02:29,913 --> 00:02:32,770 And these are interested in of course stealing data 57 00:02:32,770 --> 00:02:34,760 including intellectual property 58 00:02:34,760 --> 00:02:38,620 and research and developing data from many major government 59 00:02:38,620 --> 00:02:42,240 agencies, manufacturers, and defense contractors. 60 00:02:42,240 --> 00:02:43,073 Right. 61 00:02:43,073 --> 00:02:45,070 And we also have hactivists 62 00:02:45,070 --> 00:02:46,590 which are the people that actually carry 63 00:02:46,590 --> 00:02:48,620 out cybersecurity attacks, aimed 64 00:02:48,620 --> 00:02:51,340 at promoting a social or political cause. 65 00:02:51,340 --> 00:02:52,180 Right. 66 00:02:52,180 --> 00:02:55,550 So basically these are protesting against something 67 00:02:55,550 --> 00:02:56,383 right. 68 00:02:56,383 --> 00:02:59,930 For political or, you know, social motives. 69 00:02:59,930 --> 00:03:02,850 Right. And then we have the terrorist groups 70 00:03:02,850 --> 00:03:04,610 and they're motivated by political 71 00:03:04,610 --> 00:03:07,163 and or religious beliefs as well.