4. Cybersecurity players
This section explains who is involved in cyber risks, both inside and outside the organization.
4.1 Different types of hackers and malicious actors
To effectively defend against an enemy, it's essential to know who that enemy is. For decades, governments and cybersecurity services have been trying to define this enemy. Who is the enemy? What motivates them? How do they profit from attacks?
Of course, it's impossible to list all the players in this type of environment; however, over time, we've been able to draw up a non-exhaustive list that helps to clarify matters.
...Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Cybersecurity players
Article included in this offer
"Safety and risk management"
(
461 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!