Cyber Threat
Cyber Threat
“Cyber Threat Intelligence (CTI) is the gathering of information from various sources
about current or potential threats to an organization .”
OR
“Cyber Threat Intelligence is at its core, a structured analysis of the threat.”
CYBER
“Widespread interconnected digital network- not just internet”
This term was first coined by science fiction author William Gibson in his short story
"Burning Chrome" and later popularized in his novel "Neuromancer." Gibson used the
term to describe a virtual environment where communication and interaction between
computer systems occur. Over time, the term has been adopted to refer to the entire
interconnected digital realm of computers, networks, and online interactions.
1. Predict: They use strategic threat intelligence to forecast upcoming threats before they
happen. This helps them plan ahead and avoid potential problems.
2. Prevent: They utilize threat intelligence to stop incidents from occurring in the first place.
For example, they can use information about malware signatures to update their
systems and block potential attacks.
3. Detect: They rely on intelligence to identify threats as they emerge or even ones that are
already lurking in their networks. This includes tactics, techniques, and procedures
(TTPs) that can help them hunt down threats.
4. Respond: When an incident does occur, organizations use intelligence to guide their
response. This could involve insights into how threat actors operate and what steps the
organization should take to limit the damage.
Hacker
A hacker is an individual who uses computer, networking or other skills to overcome a technical
problem. A hacker may, for example, steal information to hurt people via identity theft or bring
down a system and, often, hold it hostage in order to collect a ransom.
❖ A black-hat hacker is a person that illegally breaks into computer networks. They may be
aiming to steal log-in credentials, personal and bank information, modify or delete stolen
data, sell data on the dark web, or commit other malicious cybercrimes. A black-hat
hacker is most often acting for personal or financial gain, criminal intentions or employed
by rogue nations. A black-hat hacker will typically work alone or with other like-minded
hackers.
❖ A white-hat hacker or ethical hacker is a cybersecurity professional who finds
vulnerabilities in networks and software to secure weak spots. Their main objective is to
find and fix any security openings before black-hat hackers can get to them. Another
responsibility is to disclose vulnerabilities to software vendors so they can patch
customer systems. A white-hat hacker may be employed as a penetration tester or similar
profession, or they may work independently and freelance their skills.
❖ Gray-hat hackers are in the middle of the ethical spectrum. Not necessarily fueled by
malice, these hackers break into networks without permission to find vulnerabilities.
Some may be looking to profit by offering to fix the issue found. Some may hack into a
network just to see if they can. Oftentimes, gray-hat hackers will hold ransom a victim’s
personal information, but may or may not release it to the public. Gray-hat hackers
typically work alone or in small groups with like-minded hackers.
Types of black hat hackers:
1. NATION STATE ACTORS- Nation State Actors work for governments to disrupt or compromise
other target governments, organisations or individuals to gain access to intelligence or valuable
data. They have been known to create significant international incidents.
Generally speaking they can operate without fear of legal retribution in their home country and
are often part of 'hackers for hire' companies aligned to the aims of a government or dictatorship.
2. CYBER CRIMINALS- Cyber Criminals are individuals or teams of people who commit malicious
activities on networks and digital systems, with the intention of stealing sensitive organisation
data or personal data, and generating profit.
3. HACKTIVISTS- Hacktivists generally operate within the social or political sphere, breaking into
and causing damage to computer systems and networks.
Hacktivism is a combination of the words 'Hacking' and 'Activism'. One of the most (in)famous
hacktivist groups of recent times would have to be Anonymous
In computer security, an attack vector is a specific path, method, or scenario that can be exploited to
break into an IT system, thus compromising its security.
Security controls
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security
risks to physical property, information, computer systems, or other assets.
Laws are structured rules that are used to govern society. Ethics are generally considered as moral
values that an individual may establish as their own personal rules to live by.
Relevant regulation includes: Human Rights Act 1998 (Article 8),Regulation of Investigatory Powers Act
2000 (RIPA), Computer Misuse Act 1990, Data Protection Act 1998 (DPA), Criminal Procedure and
Investigations Act 1996 (CPIA), Bribery Act 2010, and the Proceeds of Crime Act 2002 (POCA).