Cybersecurity Threats and Threat Actors

Objectives

After completing this lesson, you will be able to:

  • Describe the most common cybersecurity threats
  • Describe the most common threat actors

Why Is Cybersecurity Relevant for You?

How do you feel when you read these headlines?

‘One in two French people’s data was stolen in a major cybersecurity breach.’ (Euronews)

‘57% surge of cyberattacks in Europe flagged.’(European DIGITAL SME Alliance)

Photo of two hackers working in a dark room with computer equipment

If these headlines don’t concern you, they should. Cybersecurity attacks are on the rise and they affect all of us.

Cybersecurity Threats

Which of the following do you classify as a cybersecurity threat?

  • Identity theft

  • Malware

  • E-mail scams

  • Unsecured Wi-Fi networks

  • Weak passwords

They’re all cybersecurity threats.

A cybersecurity threat is any dangerous situation where bad actors could use the internet to steal your data, damage your devices, or invade your privacy.

Cybersecurity Threat Actors

But who carries out these attacks and why?

Someone who carries out a cyberattack is a threat actor and not all threat actors are the same. They have different motivations, ways of operating, and targets.

Let’s consider some of the most common types of threat actors.

A list of different kinds of threat actors, with descriptions for each.
Another list of different kinds of threat actors, with descriptions for each.

Despite their different motivations and methods, all these threat actors have one thing in common; they use technology and the internet to carry out malicious activities. And they’re a threat to you, your data, and your identity.

Summary

By now you've learned why cybersecurity matters more than ever in this digital age. You've also learned about the risks facing your personal data during everyday online activities. You’ve discovered the types of threat actors who can exploit your information for different reasons.

In the following units, you'll build on this knowledge by diving deeper into some cybersecurity threats and exploring practical ways you can protect yourself from these threats. But first, a quick quiz to check your understanding of cybersecurity and threat actors.

Log in to track your progress & complete quizzes