The Adversary, who they are.
THE ABUSERS OF INTERNET PROTOCOL RESOURCES, LAYER 7
The Abusers/Adversary Explained:
1.Cyber-Criminal - An individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.
2.Hacktivist - The use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda, ideological motives or social change.
3.Competitors - Industry competitor, a competing interest involving cyber spying or espionage. An attempt to gain an economic advantage, targeting sensitive Intellectual Property.
4.Insider (knowingly or unwitting) Threat to an organization that comes from people within the Organization, such as employees, former employees, contractors or business associates, anyone who has legitimate access, either by accidental or deliberate misuse.
5.Nation State - Motivated by nationalism and tasked with gaining secrets from or disrupting other nations via cyber means. Organized crime entity employed by a national government.
A. Cyber Warfare -. Cyber Warfare is the use of digital attacks to attack a nation, causing comparable harm to actual warfare and or disrupting the vital computer systems.
B. Cyber Terrorism - Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant bodily harm in order to achieve political or ideological gains through threat or intimidation.
THE CYBER ECOSYSTEM MAP