0
0
Cybersecurityknowledge~10 mins

Threat actors and motivations in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to identify a common type of threat actor.

Cybersecurity
A person who hacks systems for financial gain is called a [1].
Drag options to blanks, or click blank then click option'
Ascript kiddie
Bblack hat hacker
Cwhite hat hacker
Dsecurity analyst
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing black hat hackers with white hat hackers.
2fill in blank
medium

Complete the sentence to describe a motivation behind cyber attacks.

Cybersecurity
Many threat actors are motivated by [1] to steal sensitive data.
Drag options to blanks, or click blank then click option'
Afinancial profit
Bhelping others
Ccuriosity
Dsystem maintenance
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing motivations that are positive or unrelated to crime.
3fill in blank
hard

Fix the error in the statement about threat actors.

Cybersecurity
An [1] is a government-sponsored hacker group.
Drag options to blanks, or click blank then click option'
Ainsider threat
Bscript kiddie
Cadvanced persistent threat
Dhacktivist
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing hacktivists with government groups.
4fill in blank
hard

Fill both blanks to complete the description of a threat actor and their motivation.

Cybersecurity
A [1] attacks systems to promote a political cause and is motivated by [2].
Drag options to blanks, or click blank then click option'
Ahacktivist
Bfinancial gain
Cideology
Dscript kiddie
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing financial gain with political motivations.
5fill in blank
hard

Fill all three blanks to complete the sentence about threat actors and their motivations.

Cybersecurity
An [1] is an employee who misuses access for [2], often causing [3].
Drag options to blanks, or click blank then click option'
Ainsider threat
Bpersonal gain
Cdamage
Dexternal attacker
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing insider threats with external attackers.