Threat Actor Types
Threat Actor Types
Insider threats
Insider threats abuse their authorized access to obtain data that may harm
an organization. Their intentions and motivations can include:
Sabotage
Corruption
Espionage
Hacktivists
Hacktivists are threat actors that are driven by a political agenda. They
abuse digital technology to accomplish their goals, which may include:
Demonstrations
Propaganda
Fame
As a security analyst,
Controls, frameworks, and compliance
GDPR is a European Union (E.U.) general data regulation that protects the
processing of E.U. residents’ data and their right to privacy in and out of E.U.
territory. For example, if an organization is not being transparent about the
data they are holding about an E.U. citizen and why they are holding that
data, this is an infringement that can result in a fine to the organization.
Additionally, if a breach occurs and an E.U. citizen’s data is compromised,
they must be informed. The affected organization has 72 hours to notify the
E.U. citizen about the breach.
1. Privacy
2. Security
3. Breach notification
Organizations that store patient data have a legal obligation to inform
patients of a breach because if patients' Protected Health Information
(PHI) is exposed, it can lead to identity theft and insurance fraud. PHI relates
to the past, present, or future physical or mental health or condition of an
individual, whether it’s a plan of care or payments for care. Along with
understanding HIPAA as a law, security professionals also need to be familiar
with the Health Information Trust Alliance (HITRUST®), which is a security
framework and assurance program that helps institutions meet HIPAA
compliance.
Associate
Supervisor
Manager
Executive
Vendor
Others
Pro tip: There are a number of regulations that are frequently revised. You
are encouraged to keep up-to-date with changes and explore more
frameworks, controls, and compliance. Two suggestions to research: the
Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act.
Key takeaways