From the course: Threat Intelligence: From Analysis to Program Design by Infosec
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Hacktivists
From the course: Threat Intelligence: From Analysis to Program Design by Infosec
Hacktivists
- [Peter] Hello everyone. Welcome to the threat intelligence learning path, which will allow you to master the concept of threat intelligence from intelligence analysis to building a threat intelligence program. My name is Peter Vance. I am a threat intelligence manager. This is Course four, Threat Actors and Tracking Actors. In this slide deck, I will talk about hacktivists. First, I will begin with who hacktivists are, what their goals and motivations are. Afterwards, I will talk about their modus operandi, the method of how they conduct their activities. Then I will go through their suspected capabilities and finally talk about some example noteworthy actors. Activists are typically motivated by a cause. According to be political, economic or social. Heists may steal and disseminate sensitive, proprietary or sometimes classified data in the name of free speech. Other times, they aim to deny access to a particular service or website by conducting a distributed denial of service…