CompTIA Security+ SY0-701 2.1 Study Guide: Understanding Threat Actors
Source: Dev.to

In the field of cybersecurity, identifying the source of an attack is as critical as stopping the attack itself. This guide examines threat actors—the entities responsible for security events. By analyzing their attributes, motivations, and methods, security professionals can better anticipate risks and implement effective defenses.
1. Defining the Threat Actor
A threat actor is an entity that causes an event affecting the security of others. Because their actions typically result in negative consequences, they are frequently referred to as malicious actors.
Attributes of Threat Actors
| Attribute | Description |
|---|---|
| Location | Internal (inside the organization) or external (outside the organization). |
| Resources & Funding | Massive budget (e.g., a government) vs. limited means (e.g., a solo hobbyist). |
| Level of Sophistication | Ranges from unskilled actors using pre‑made tools to highly sophisticated actors who develop custom exploits and software. |
| Real‑World Comparison | Burglar analogy: • Script kiddie – a teenager trying doors to see if one is unlocked. • Organized crime – a professional heist crew with blueprints, specialized tools, and a getaway driver. • Nation‑state – a foreign intelligence agency using high‑tech surveillance and specialized equipment to infiltrate a high‑security vault. |
2. Profiles of Threat Actors
The CompTIA SY0‑701 exam requires an understanding of specific categories of threat actors. Below are the primary types identified in the source materials.
Nation State
- Definition – Government‑sponsored entities or arms of a government dedicated to national security.
- Sophistication – Very high; they employ elite developers to create advanced attacks.
- Resources – Extensive; backed by an entire country’s budget and infrastructure.
- Motivations – National security, political gain, data exfiltration, or military objectives (e.g., disrupting utilities or finances).
- Key Concept – Advanced Persistent Threats (APTs): ongoing, sophisticated attacks that often strike multiple locations simultaneously.
- Example – The Stuxnet worm, a collaborative effort between the United States and Israel designed to destroy nuclear centrifuges.
Unskilled Attackers
- Also known as – “Script kiddies.”
- Sophistication – Low; they run scripts or tools created by others without understanding the underlying code.
- Resources – Limited; generally lack significant funding.
- Motivations – Thrill of the attack, disruption of services, or data exfiltration.
- Method – Seek the “easiest way in” using publicly available resources; if a script fails, they lack the skill to modify it.
Hacktivists
- Definition – “Hacktivist” = hacker + activist; motivated by political or philosophical ideologies.
- Sophistication – High; often very talented technologists.
- Resources – Limited, though some engage in fundraising to support their causes.
- Motivations – Disrupt or damage an organization to make a point, deface websites to spread a message, or leak private documents to the public.
- Location – Usually external, but may attempt to gain internal footholds.
Insider Threats

The insider threat is one of the most difficult actors to detect because they already have legitimate access to the organization.
- Sophistication: Medium – their strength lies in institutional knowledge; they know where the sensitive data is and how to bypass specific security controls.
- Resources: They leverage the organization’s own resources.
- Motivations: Revenge against the company or personal financial gain.
- Prevention: Thorough vetting during the hiring process is essential to mitigate this risk.
Organized Crime

This is a professionalized group of hackers working together for a common goal.
- Sophistication: High – they often have a corporate‑like structure with specialized roles (hackers, exploit managers, data sellers, and even customer support for ransomware victims).
- Resources: Extensive – funded by the profits of their illegal activities.
- Motivations: Purely financial gain.
Shadow IT

Shadow IT refers to individuals or departments within an organization who use hardware or software without the knowledge or approval of the IT department.
- Sophistication: Low to limited – often non‑technical employees trying to bypass IT bureaucracy to work faster.
- Resources: Limited to departmental budgets or personal credit cards for cloud services.
- Risks: Because they bypass “change control” and official security policies, they often lack backups and leave the organization vulnerable to unintended security gaps.
3. Comparative Summary of Threat Actors

Understanding the who and the why behind a cyber‑attack is just as important as the how. By categorizing threat actors, security professionals can move from a reactive posture to a proactive one—tailoring defenses to meet the specific levels of sophistication and resources an attacker might bring to the table.
If you were a threat actor, which of your organization’s defenses would be the easiest for you to bypass today?




