Cyber Threat Actors and Their Activities

docx

School

Meru University College of Science and Technology (MUCST) *

*We aren’t endorsed by this school

Course

MANAGERIAL

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

4

Uploaded by kipketervictor40

Report
Cyber Threat Actors and Their Activities Student Name Institutional Affiliation Date of Submission
Threat actors are malicious actors responsible for many cyber incidents against enterprises, governments, and other companies. They can range from individual hackers to organized crime groups and even state-sponsored actors. Some of the activities that threat actors carry out include malicious code injection, distributed denial-of-service (DDoS) attacks, phishing, ransomware, and data theft. Malicious code injection involves injecting malicious code into a system, which can be used to gain unauthorized access to systems, steal data, or disrupt operations. DDoS attacks involve flooding a system with requests, which can cause the system to crash or become unavailable (Gebru & Damen, 2019). Phishing is fraudulently obtaining confidential information, such as passwords, by pretending to be a reputable organization. Ransomware is malicious software that encrypts data, making it inaccessible until a ransom is paid. And data theft involves the unauthorized copying of data from a system. One example of the potential for messing things up is the Target data breach in 2013. In this incident, threat actors were able to gain access to the Point of Sale systems in over 1,800 Target stores, stealing the payment card information of over 70 million customers. The threat actors could gain access to the Target systems because of weaknesses in the network security architecture. Specifically, the threat actors were able to exploit vulnerabilities in the remote access system, which allowed them to gain access to the Point of Sale systems. To prevent similar incidents from occurring in the future, organizations need to prioritize security by implementing measures such as password enforcement, two-factor authentication, and regular security updates (Mousavi & Mathew, 2020). Additionally, organizations should conduct regular security audits and vulnerability assessments to identify and address potential system weaknesses. Furthermore, organizations should provide security awareness training to their employees to make them aware of potential threats and how to respond to them. Finally,
organizations should establish incident response plans to help them prepare for and respond to potential security incidents.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Gebru, T., & Damen, M. (2019). A review of threat actors in cybercrime. International Journal of Critical Infrastructure Protection, 28, 1-13. Mousavi, S., & Mathew, P. (2020). Cyber threat actors: a comprehensive review. Computers & Security, 91, 101829.