Skip main navigation

Types of attackers

As the world embraces more digital and hyperconnected components, opportunities increase for attackers to gain access to our sensitive information.
© Coventry University. CC BY-NC 4.0
As the world embraces more digital and hyperconnected components, opportunities and paths become more numerous for attackers to gain access to our most sensitive information. Data breaches have become commonplace, from banking to retail, healthcare to entertainment, and even government. No sector is immune.
The cyber black markets offers the computer-hacker tools and services to carry out cyber crime attacks and sell the stolen data: credit cards, personal data, and intellectual property.
Attackers, or ‘cyber threat actors’, can be grouped by their set of goals, motivation, and capabilities. Based on the motivation, these threat actors can be described as cyber terrorists, hacktivists, state-sponsored actors, and cyber criminals. The table below indicates the motivation of the dynamically changing attack profiles:
Changing attacker profiles: scale from recreational, criminal, hacktivist, organised crime to state sponsored Click image to enlarge
The videos below demonstrate two different types of attackers: firstly Charlton Floate could be identified as a ‘recreational’ hacker, gaining unlawful entry to an organisation or government system ‘for fun’. The second example, the attack on the UK National Health Service (NHS) in 2017, was rumoured to be the work of a state-sponsored attack.

This is an additional video, hosted on YouTube.

This is an additional video, hosted on YouTube.

The key principle with digital security is understanding what information you are holding, how you use the digital infrastructure to work with this information and therefore what types of attacks are most likely to be a concern.
For example, a competitor may wish to hack your systems to see what new products you are developing. This aligns with hacking government departments in terms of one country trying to find out what another country is doing. Or there is the opportunist trying to make some money by exploiting a weakness – theft of information to sell or ransom. There are many other reasons, but you need to consider not only the information you hold and who would be interested in it but also what happens if an internal person (eg member of staff) decides to leak information or ransom it?
The disgruntled employee can be a real threat as they already have system access.
© Coventry University. CC BY-NC 4.0
This article is from the free online

The Cyber Security Landscape

Created by
FutureLearn - Learning For Life

Our purpose is to transform access to education.

We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.

We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.

Learn more about how FutureLearn is transforming access to education

close
  • 30% off Futurelearn Unlimited!