Resources and funding determines how well a threat actor is able to support the attack monetarily or with the needed equipment and software.