Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
1. INTRODUCTION TO CYBERSECURITY
1.3. Who Are the Cyber Attackers?
-
Hackers – Individuals who exploit systems for fun, profit, or protest.
-
Hacktivists – Use hacking to promote political or social causes.
-
Cybercriminals – Steal data or money for financial gain.
-
Insiders – Employees or trusted individuals who misuse access.
-
State-sponsored attackers – Operate on behalf of governments to steal secrets or disrupt services.