CompTIA Security+ SY0-701 2.1 Study Guide: Understanding Threat Actors

Published: (January 19, 2026 at 07:49 PM EST)
4 min read
Source: Dev.to

Source: Dev.to

Cover image for CompTIA Security+ SY0-701 2.1 Study Guide: Understanding Threat Actors

Andrew Despres

In the field of cybersecurity, identifying the source of an attack is as critical as stopping the attack itself. This guide examines threat actors—the entities responsible for security events. By analyzing their attributes, motivations, and methods, security professionals can better anticipate risks and implement effective defenses.

1. Defining the Threat Actor

Defining Threat Actors

A threat actor is an entity that causes an event affecting the security of others. Because their actions typically result in negative consequences, they are frequently referred to as malicious actors.

Attributes of Threat Actors

AttributeDescription
LocationInternal (inside the organization) or external (outside the organization).
Resources & FundingMassive budget (e.g., a government) vs. limited means (e.g., a solo hobbyist).
Level of SophisticationRanges from unskilled actors using pre‑made tools to highly sophisticated actors who develop custom exploits and software.
Real‑World ComparisonBurglar analogy:
Script kiddie – a teenager trying doors to see if one is unlocked.
Organized crime – a professional heist crew with blueprints, specialized tools, and a getaway driver.
Nation‑state – a foreign intelligence agency using high‑tech surveillance and specialized equipment to infiltrate a high‑security vault.

2. Profiles of Threat Actors

The CompTIA SY0‑701 exam requires an understanding of specific categories of threat actors. Below are the primary types identified in the source materials.

Nation State

Nation State Attackers

  • Definition – Government‑sponsored entities or arms of a government dedicated to national security.
  • Sophistication – Very high; they employ elite developers to create advanced attacks.
  • Resources – Extensive; backed by an entire country’s budget and infrastructure.
  • Motivations – National security, political gain, data exfiltration, or military objectives (e.g., disrupting utilities or finances).
  • Key ConceptAdvanced Persistent Threats (APTs): ongoing, sophisticated attacks that often strike multiple locations simultaneously.
  • Example – The Stuxnet worm, a collaborative effort between the United States and Israel designed to destroy nuclear centrifuges.

Unskilled Attackers

Unskilled Attackers

  • Also known as – “Script kiddies.”
  • Sophistication – Low; they run scripts or tools created by others without understanding the underlying code.
  • Resources – Limited; generally lack significant funding.
  • Motivations – Thrill of the attack, disruption of services, or data exfiltration.
  • Method – Seek the “easiest way in” using publicly available resources; if a script fails, they lack the skill to modify it.

Hacktivists

Hacktivists

  • Definition – “Hacktivist” = hacker + activist; motivated by political or philosophical ideologies.
  • Sophistication – High; often very talented technologists.
  • Resources – Limited, though some engage in fundraising to support their causes.
  • Motivations – Disrupt or damage an organization to make a point, deface websites to spread a message, or leak private documents to the public.
  • Location – Usually external, but may attempt to gain internal footholds.

Insider Threats

Insider Threats

The insider threat is one of the most difficult actors to detect because they already have legitimate access to the organization.

  • Sophistication: Medium – their strength lies in institutional knowledge; they know where the sensitive data is and how to bypass specific security controls.
  • Resources: They leverage the organization’s own resources.
  • Motivations: Revenge against the company or personal financial gain.
  • Prevention: Thorough vetting during the hiring process is essential to mitigate this risk.

Organized Crime

Organized Crime

This is a professionalized group of hackers working together for a common goal.

  • Sophistication: High – they often have a corporate‑like structure with specialized roles (hackers, exploit managers, data sellers, and even customer support for ransomware victims).
  • Resources: Extensive – funded by the profits of their illegal activities.
  • Motivations: Purely financial gain.

Shadow IT

Shadow IT

Shadow IT refers to individuals or departments within an organization who use hardware or software without the knowledge or approval of the IT department.

  • Sophistication: Low to limited – often non‑technical employees trying to bypass IT bureaucracy to work faster.
  • Resources: Limited to departmental budgets or personal credit cards for cloud services.
  • Risks: Because they bypass “change control” and official security policies, they often lack backups and leave the organization vulnerable to unintended security gaps.

3. Comparative Summary of Threat Actors

Table comparing the different types of threat actors

Understanding the who and the why behind a cyber‑attack is just as important as the how. By categorizing threat actors, security professionals can move from a reactive posture to a proactive one—tailoring defenses to meet the specific levels of sophistication and resources an attacker might bring to the table.

If you were a threat actor, which of your organization’s defenses would be the easiest for you to bypass today?

Back to Blog

Related posts

Read more »

New Vulnerability in n8n

This isn’t good: We discovered a critical vulnerability CVE-2026-21858, CVSS 10.0 in n8n that enables attackers to take over locally deployed instances, impacti...

코헤시티가 제시하는 사이버 복원력 5단계 프레임워크

사이버 공격이 기업의 재무 상태와 주가, 성장 전략에 심각한 타격을 입히면서 사이버 복원력이 이사회의 핵심 의제로 부상했다. AI를 활용한 공격 자동화로 백업 데이터까지 파괴되는 상황이며, 국내 기업의 대다수가 실질적인 재정적 피해와 규제 제재를 경험하고 있다. 단순한 예방을 넘어 멀티...