SlideShare a Scribd company logo
Two categories of attackers include hacktivists and state actors.
What are the differences between hacktivists and state-sponsored attackers? Write a report
detailing what you were able to find.

More Related Content

More from adonisjpr

Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdfTwitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
adonisjpr
 
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdfTurner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
adonisjpr
 
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdfUber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
adonisjpr
 
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdfTrilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
adonisjpr
 
Transforming Data - Creating a Data Set Creating a JOIN between two .pdf
Transforming Data - Creating a Data Set Creating a JOIN between two .pdfTransforming Data - Creating a Data Set Creating a JOIN between two .pdf
Transforming Data - Creating a Data Set Creating a JOIN between two .pdf
adonisjpr
 
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdfUsing the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
adonisjpr
 
Using the packet tracer simulator, create a network topology that in.pdf
Using the packet tracer simulator, create a network topology that in.pdfUsing the packet tracer simulator, create a network topology that in.pdf
Using the packet tracer simulator, create a network topology that in.pdf
adonisjpr
 
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdfusing silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
adonisjpr
 
Using financial data and information from Yahoo Finance only, calcul.pdf
Using financial data and information from Yahoo Finance only, calcul.pdfUsing financial data and information from Yahoo Finance only, calcul.pdf
Using financial data and information from Yahoo Finance only, calcul.pdf
adonisjpr
 
using IRAC method Joseph was a team manager of an excursion in the O.pdf
using IRAC method Joseph was a team manager of an excursion in the O.pdfusing IRAC method Joseph was a team manager of an excursion in the O.pdf
using IRAC method Joseph was a team manager of an excursion in the O.pdf
adonisjpr
 
Using Java programming language solve the followingSLL CLASS.pdf
Using Java programming language solve the followingSLL CLASS.pdfUsing Java programming language solve the followingSLL CLASS.pdf
Using Java programming language solve the followingSLL CLASS.pdf
adonisjpr
 
using IRAC method Mary is an explorer and is about to set off on a.pdf
using IRAC method Mary is an explorer and is about to set off on a.pdfusing IRAC method Mary is an explorer and is about to set off on a.pdf
using IRAC method Mary is an explorer and is about to set off on a.pdf
adonisjpr
 
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdfUSING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
adonisjpr
 
Using facial recognition software in shelters for victims of domesti.pdf
Using facial recognition software in shelters for victims of domesti.pdfUsing facial recognition software in shelters for victims of domesti.pdf
Using facial recognition software in shelters for victims of domesti.pdf
adonisjpr
 
Using a bash shell write a script using getops with options that dis.pdf
Using a bash shell write a script using getops with options that dis.pdfUsing a bash shell write a script using getops with options that dis.pdf
Using a bash shell write a script using getops with options that dis.pdf
adonisjpr
 
Use the modified abstract below to answer the following two question.pdf
Use the modified abstract below to answer the following two question.pdfUse the modified abstract below to answer the following two question.pdf
Use the modified abstract below to answer the following two question.pdf
adonisjpr
 
Use the info that os provided. I just need basic sketch I H.I. H..1..pdf
Use the info that os provided. I just need basic sketch I H.I. H..1..pdfUse the info that os provided. I just need basic sketch I H.I. H..1..pdf
Use the info that os provided. I just need basic sketch I H.I. H..1..pdf
adonisjpr
 
Tory and Cathy entered into a contract under which Cathy was suppose.pdf
Tory and Cathy entered into a contract under which Cathy was suppose.pdfTory and Cathy entered into a contract under which Cathy was suppose.pdf
Tory and Cathy entered into a contract under which Cathy was suppose.pdf
adonisjpr
 
use Selenium to write a Java code that will Scrape data from a podca.pdf
use Selenium to write a Java code that will Scrape data from a podca.pdfuse Selenium to write a Java code that will Scrape data from a podca.pdf
use Selenium to write a Java code that will Scrape data from a podca.pdf
adonisjpr
 
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdfUse the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
adonisjpr
 

More from adonisjpr (20)

Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdfTwitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
Twitter, el popular sitio de microblogs, se ha enfrentado a graves c.pdf
 
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdfTurner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
Turner, Roth y Lowe son socios que comparten ingresos y p�rdidas en .pdf
 
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdfUber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
Uber - Bir Startupn K�kenleri ve lk G�nleriDava M�terileri ele.pdf
 
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdfTrilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
Trilogy Enterprises Inc. de Austin, Texas, es una empresa de softwar.pdf
 
Transforming Data - Creating a Data Set Creating a JOIN between two .pdf
Transforming Data - Creating a Data Set Creating a JOIN between two .pdfTransforming Data - Creating a Data Set Creating a JOIN between two .pdf
Transforming Data - Creating a Data Set Creating a JOIN between two .pdf
 
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdfUsing the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
Using the location quotients(LQ) for year 2020 for 10 provinces anal.pdf
 
Using the packet tracer simulator, create a network topology that in.pdf
Using the packet tracer simulator, create a network topology that in.pdfUsing the packet tracer simulator, create a network topology that in.pdf
Using the packet tracer simulator, create a network topology that in.pdf
 
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdfusing silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
using silde 2 to answer silde 1 and 3 Step 17 of 40 - Create T Accou.pdf
 
Using financial data and information from Yahoo Finance only, calcul.pdf
Using financial data and information from Yahoo Finance only, calcul.pdfUsing financial data and information from Yahoo Finance only, calcul.pdf
Using financial data and information from Yahoo Finance only, calcul.pdf
 
using IRAC method Joseph was a team manager of an excursion in the O.pdf
using IRAC method Joseph was a team manager of an excursion in the O.pdfusing IRAC method Joseph was a team manager of an excursion in the O.pdf
using IRAC method Joseph was a team manager of an excursion in the O.pdf
 
Using Java programming language solve the followingSLL CLASS.pdf
Using Java programming language solve the followingSLL CLASS.pdfUsing Java programming language solve the followingSLL CLASS.pdf
Using Java programming language solve the followingSLL CLASS.pdf
 
using IRAC method Mary is an explorer and is about to set off on a.pdf
using IRAC method Mary is an explorer and is about to set off on a.pdfusing IRAC method Mary is an explorer and is about to set off on a.pdf
using IRAC method Mary is an explorer and is about to set off on a.pdf
 
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdfUSING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
USING httpsraw.githubusercontent.comBeeDrHUIntroduction-to-Py.pdf
 
Using facial recognition software in shelters for victims of domesti.pdf
Using facial recognition software in shelters for victims of domesti.pdfUsing facial recognition software in shelters for victims of domesti.pdf
Using facial recognition software in shelters for victims of domesti.pdf
 
Using a bash shell write a script using getops with options that dis.pdf
Using a bash shell write a script using getops with options that dis.pdfUsing a bash shell write a script using getops with options that dis.pdf
Using a bash shell write a script using getops with options that dis.pdf
 
Use the modified abstract below to answer the following two question.pdf
Use the modified abstract below to answer the following two question.pdfUse the modified abstract below to answer the following two question.pdf
Use the modified abstract below to answer the following two question.pdf
 
Use the info that os provided. I just need basic sketch I H.I. H..1..pdf
Use the info that os provided. I just need basic sketch I H.I. H..1..pdfUse the info that os provided. I just need basic sketch I H.I. H..1..pdf
Use the info that os provided. I just need basic sketch I H.I. H..1..pdf
 
Tory and Cathy entered into a contract under which Cathy was suppose.pdf
Tory and Cathy entered into a contract under which Cathy was suppose.pdfTory and Cathy entered into a contract under which Cathy was suppose.pdf
Tory and Cathy entered into a contract under which Cathy was suppose.pdf
 
use Selenium to write a Java code that will Scrape data from a podca.pdf
use Selenium to write a Java code that will Scrape data from a podca.pdfuse Selenium to write a Java code that will Scrape data from a podca.pdf
use Selenium to write a Java code that will Scrape data from a podca.pdf
 
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdfUse the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
Use the built-in PHP variables $_POST, $_GET, $_REQUEST or filter_in.pdf
 

Recently uploaded

Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Two categories of attackers include hacktivists and state actors. .pdf

  • 1. Two categories of attackers include hacktivists and state actors. What are the differences between hacktivists and state-sponsored attackers? Write a report detailing what you were able to find.