Term
|
Definition
Hackers that are relatively new or unskilled Skill Level: Low Funding: Low Motivation: Curiosity -Typically looking to see that they can get into -LIke the challenge -Not associated with any organized hacking groups |
|
|
Term
|
Definition
Hackers who are motivated by ideology or political cause Skill Level:Medium to high Funding: Medium to High Motivation: Ideological
Funding: Medium to High -May be well funded -Usually deface web sites -Steal Information: PII, Credentials -DDoS -Not patient or stealthy |
|
|
Term
|
Definition
Hackers who are motivated by financial gain Skill Level: High Funding: High Motivation: Financial -Deliberate with high skill -Well Funded -Patient and persistent -POS Tereminals, ATM machines, credit card numbers -PII for sale on Dark Web |
|
|
Term
|
Definition
Highly skilled hackers whose main goal is to penetrate government or commercial systems. Skill Level: High Funding: High Motivation: Espionage -Cyber Espionage -Data/IP theft -Sabotage -Cyber warfare -Very stealthy and persistent -Well Funded -Penetrate and wait. Don't want their victims to know they are there. |
|
|
Term
|
Definition
Motivated by financial Gain Skill Level: Low to High Motivation: Financial Gain -IP theft -Accidental exposure from misuse or misconfigured systems -Data theft includes IP and company secrets |
|
|
Term
|
Definition
Motivated by financial gain Skill Level: Low to High Motivation: Competitive advantage, Financial -Theft of IP or company secrets -Sabotage -High or low skill level -Can be well funded |
|
|
Term
Open Source Intelligence (OSINT) |
|
Definition
Tools and websites for intelligence gathering and reconnaissance. -SHODAN -Google Hacking Database(GHDB) -Wayback Machine -KALI LINUX -Browser Plugins -Social Engineer Toolkit |
|
|
Term
|
Definition
If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see. |
|
|
Term
|
Definition
Hackers who use their powers for good rather than evil. Also known as “ethical hackers.” |
|
|
Term
|
Definition
Usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.
Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime. |
|
|