From the course: ISACA Certified Information Systems Auditor (CISA) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Threat actors and vectors

Threat actors and vectors

- [Presenter] Our next section is going to talk about threat actors and threat vectors. So when we talk about our threat actors, who are those folks that are implementing the threats, right? Who are the attackers that we're concerned with that we're looking for? All right? And then threat vectors. How are these attacks implemented? How is the malware distributed, for instance? So if we start talking about actors, first of all, you know, one of the most significant development of the last, you know, 10 years or more, is we're starting to see more and more cyber espionage types of attacks and cyber terrorism even. So we have to think about enemy nations and state-sponsored attacks. And I've put a note here for advanced persistent threats because these advanced persistent threats are often tools that these nations will use. Now, simply defines a group of tools or a group of techniques used over time to kind of chip away at the defenses of the desired target. So it may start off with a…

Contents