Skip to content
This repository has been archived by the owner on Nov 2, 2024. It is now read-only.

Commit

Permalink
Updated sec+ notes, fixed typo.
Browse files Browse the repository at this point in the history
  • Loading branch information
joseeden committed May 3, 2024
1 parent 8de2d33 commit d30cd48
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 14 deletions.
12 changes: 4 additions & 8 deletions pages/030-Security/019-Threat-Intelligence-and-Sources.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,17 +18,13 @@

Consider and measure the quality of intelligence.

- **Timeliness**
Property of an intelligence source that ensures it is up-to-date.
- **Timeliness** - Property of an intelligence source that ensures it is up-to-date.

- **Relevancy**
Property of an intelligence source that ensures it matches the use cases intended for it.
- **Relevancy** - Property of an intelligence source that ensures it matches the use cases intended for it.

- **Accuracy**
Property of an intelligence source that ensures it produces effective results.Information needs to be valid and true.
- **Accuracy** - Property of an intelligence source that ensures it produces effective results.Information needs to be valid and true.

- **Confidence Levels**
Property of an intelligence source that ensures it produces qualified statements about reliability.
- **Confidence Levels** - Property of an intelligence source that ensures it produces qualified statements about reliability.

## Types of intelligence

Expand Down
12 changes: 6 additions & 6 deletions pages/030-Security/026-Threat-Actors.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,11 +56,16 @@ Some common motivations are:
- The attacker can threaten to release the information to the public unless certain conditions are met.
- Demands often involve financial transactions, typically in the form of cryptocurrencies.

- **Service Disruption**
- **Service Disruptions**

- Overwhelming the organization's network through DDoS attack.
- Often done to cause chaos or make a statement.

- **Chaos or Curiosity**

- Motivated by the thrill of hacking, seeing it as a challenge, a way to prove their technical skills or simply to cause harm.
- Common among certain hacking groups or individuals exploring the limits of technology.

- **Philosopical or Political Beliefs**

- Hacktivists are motivated by ideological, political, or social causes.
Expand All @@ -75,11 +80,6 @@ Some common motivations are:

- Similar to personal vendettas, this motivation involves retaliating against someone or something that the threat actor feels has harmed them or their interests.

- **Disruption or Chaor**

- Motivated by the thrill of hacking, seeing it as a challenge, a way to prove their technical skills or simply to cause harm.
- Common among certain hacking groups or individuals exploring the limits of technology.

- **Espionage**

- Driven by the need to gather sensitive information for political, economic, or military reasons.
Expand Down

0 comments on commit d30cd48

Please sign in to comment.