Data Breaches

  1. Threat Actors and Motivations
    1. Categories of Threat Actors
      1. Cybercriminals
        1. Organized Crime Groups
          1. Individual Hackers
            1. Ransomware Operators
              1. Financial Fraudsters
              2. Nation-State Actors
                1. Government Intelligence Agencies
                  1. Military Cyber Units
                    1. State-Sponsored Groups
                      1. Advanced Persistent Threat Groups
                      2. Hacktivists
                        1. Political Activists
                          1. Social Justice Groups
                            1. Anonymous Collectives
                            2. Corporate Spies
                              1. Industrial Espionage Agents
                                1. Competitive Intelligence Gatherers
                                2. Malicious Insiders
                                  1. Disgruntled Employees
                                    1. Financially Motivated Staff
                                      1. Ideologically Driven Insiders
                                      2. Script Kiddies
                                        1. Amateur Hackers
                                          1. Tool Users
                                          2. Terrorist Organizations
                                            1. Cyber Terrorism Groups
                                              1. Hybrid Threat Actors
                                            2. Threat Actor Capabilities
                                              1. Technical Sophistication Levels
                                                1. Basic Script Users
                                                  1. Intermediate Developers
                                                    1. Advanced Researchers
                                                      1. Expert Teams
                                                      2. Resource Availability
                                                        1. Individual Resources
                                                          1. Organizational Backing
                                                            1. State Resources
                                                            2. Operational Security Practices
                                                              1. Anonymity Techniques
                                                                1. Operational Compartmentalization
                                                              2. Motivations Behind Data Breaches
                                                                1. Financial Gain
                                                                  1. Direct Monetary Theft
                                                                    1. Data Monetization
                                                                      1. Ransom Demands
                                                                        1. Cryptocurrency Mining
                                                                        2. Espionage
                                                                          1. Political Intelligence
                                                                            1. Economic Espionage
                                                                              1. Military Intelligence
                                                                                1. Competitive Advantage
                                                                                2. Ideological Purposes
                                                                                  1. Political Protest
                                                                                    1. Social Activism
                                                                                      1. Religious Extremism
                                                                                      2. Disruption and Sabotage
                                                                                        1. Service Disruption
                                                                                          1. Data Destruction
                                                                                            1. Infrastructure Damage
                                                                                            2. Personal Motivations
                                                                                              1. Revenge
                                                                                                1. Recognition
                                                                                                  1. Challenge and Thrill
                                                                                                    1. Curiosity