This assignment is intended to help with identifying main concepts from chapter 2. Use your notes, textbook and other outside resources to correctly label each defining feature to its appropriate category by placing an 'x' in the category column. Some features can apply across multiple category columns. Use your best judgement Feature Threat Actor Threat Vector Threat Data Threat Intelligence An individual often in the beginning stages of their "hacker" career with limited technical skill and typically rely on automated tools to conduct malicious activities A practice organization's use to learn about changes in a threat environment to gain valuable insight into the threat landscape. Often involves leveraging Information from public and private sources. An individual or collection of individuals whose primary goal may vary, such as the disruption of service, conduct cybercrimes for monetary gain, or attempt to bring attention to something for the greater good. Something an attacker can use to gain unauthorized access. Threat maps and threat feeds can provide an organization threat intelligence, which can then be used to provide insight and assist in making security decisions. An individual who can cause substantial damage to an organization because of their inside knowledge about the organization's inner workings. Wireless networks and cloud services are often used by attackers to gain access to an organization's systems when control settings are improperly configured. Hired contract employees at an organization use a messaging system not authorized by the organization to share proprietary information. Confidence scores are used to summarize the overall value of information about threats. Data that comes from inside or outside an organization that can provide Indicators of Compromise (loc) or be used for predictive analysis