SecuritySecurity+CISSP

Threat Actors and Attack Vectors Explained for Security+

Knowing that someone might attack you is not enough. Security decisions require knowing who is likely to attack, what they want, how sophisticated they are, and which paths they will use to get in. A nation-state attacker and a script kiddie both represent threats, but they require completely different defensive priorities. Security+ SY0-701 presents attack scenarios and asks you to identify the threat actor type or the most likely vector. Getting these categories precise matters because wrong-answer choices are deliberately designed to blur the distinctions you need to draw.

7 min
3 sections · 6 exam key points

Threat actor types and motivations

Nation-state actors are government-sponsored groups with essentially unlimited resources and long operational timelines. Their goal is usually intelligence collection or sabotage, not quick financial gain. They use advanced persistent threat (APT) techniques: quiet, patient, long-term access that can go undetected for months or years. When a question describes an attacker who maintained access to a critical infrastructure network for 18 months without detection, that is a nation-state profile.

Organized crime groups are profit-driven and run attacks like businesses. They deploy ransomware for payment, conduct fraud, steal financial data, and sell compromised credentials on dark web markets. High sophistication, financially motivated. They will not waste resources on targets with low payoff.

Hacktivists are motivated by ideology or politics rather than money. Variable sophistication. Common tactics include defacement, DDoS, and data leaks intended to embarrass or publicize a cause. Anonymous is the most well-known hacktivist collective.

Script kiddies lack technical knowledge and use pre-built tools, exploit kits, and scripts created by others. They are opportunistic rather than targeted, scanning for known vulnerabilities and attacking whatever responds. Low sophistication does not mean low risk: they generate enormous volumes of attacks against unpatched systems.

Insider threats are current or former employees, contractors, or partners with authorized access. They are uniquely dangerous because they already have legitimate credentials and know which systems are valuable. Insider threats can be malicious (intentional data theft, sabotage) or unintentional (accidentally clicking phishing links, losing devices).

Attack vectors and supply chain attacks

An attack vector is the path the attacker uses to get into your environment. Direct access means physical presence and hands on the hardware. Wireless attacks exploit unprotected or poorly protected Wi-Fi, including rogue access points and evil twin attacks. Email remains the most common initial access vector for enterprises, delivering phishing and malware directly to users.

Supply chain attacks are among the most dangerous vectors because they compromise something you already trust. The SolarWinds attack embedded malware in a legitimate software update that was cryptographically signed and automatically distributed to thousands of organizations. The victims had no reason to distrust a signed update from a vendor they depended on. Supply chain attacks exploit that trust relationship.

Shadow IT, employees using unauthorized cloud applications or personal devices for work, is not a malicious actor but creates serious attack surface. Data goes into services that are not monitored, not patched, and not compliant with corporate policy. The attacker does not need to breach the corporate network if the data is sitting in a personal Dropbox.

How to choose the correct answer

Motivation mapping: espionage, long-term access, critical infrastructure, government target = nation-state. Financial gain, ransomware, fraud = organized crime. Ideological, public disruption, defacement = hacktivist. Uses pre-built tools, opportunistic scanning = script kiddie. Has legitimate credentials, internal access = insider threat.

Attack vector identification: phishing email = email vector. Infected USB drive left in parking lot = removable media, also baiting. Compromised software update = supply chain. Rogue access point = wireless. Physical access to server room = direct physical.

Shadow IT is not a threat actor. It is a risk category created by users operating outside official IT channels. Treat it as an attack surface management issue, not an adversary.

Key exam facts — Security+ / CISSP

  • Nation-state: APT, long-term stealth, espionage or sabotage, government-sponsored.
  • Organized crime: financially motivated, ransomware, credential theft, run like a business.
  • Hacktivists: ideological, defacement, DDoS, public embarrassment of targets.
  • Script kiddies: pre-built tools, opportunistic, low sophistication but high volume.
  • Insider threats: authorized access, malicious or unintentional, most dangerous due to trust.
  • Supply chain: compromise a trusted vendor or update mechanism to reach many downstream targets.

Common exam traps

Script kiddies are not a real threat because they do not understand what they are doing.

Script kiddies use real exploits against real vulnerabilities. They cause genuine damage. Their high volume of opportunistic attacks means unpatched systems will be hit regularly. Dismissing them as non-threats leads to neglecting basic patching hygiene.

Insider threats are always intentional and malicious.

Insider threats include both malicious actors and unintentional ones. An employee who clicks a phishing link, leaves a laptop unencrypted on a train, or accidentally sends sensitive data to the wrong recipient is an insider threat. Unintentional insiders are more common than malicious ones.

Nation-state attacks are detectable because they are loud and damaging.

Nation-state (APT) attacks are specifically designed to be quiet, persistent, and undetectable for as long as possible. The goal is sustained access for intelligence collection, not a noisy smash-and-grab. Their sophistication specifically enables long-term stealth operation.

Practice this topic

Test yourself on Threat Actors

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics