Analysis should include case studies of cyber attacks carried out by different threat actors for different purposes.
Process/Skill Questions:
Thinking
- What is a threat actor?
- Why is it important to identify the motivation of a threat actor?
Communication
- Who should be informed of identified threat actors?
- What communication skills are helpful in identifying the motivations of threat actors?
Leadership
- How can leaders encourage policies and procedures to protect against threat actors?
- What factors should be considered when responding to a threat actor?
Management
- What data is used to determine the motivation of a threat actor?
- What lessons have been learned from studying the motivations of past cybersecurity threat actors?
Teacher Resource: