Cybersecurity Program Development for Business by Chris Moschovitis

Cybersecurity Program Development for Business by Chris Moschovitis

Author:Chris Moschovitis
Language: eng
Format: epub
ISBN: 9781119430001
Publisher: Wiley
Published: 2018-05-08T00:00:00+00:00


Threat Rankings

Your next task is to rank the preceding list in terms of which actors and motives are most likely to be engaged in your world. You have a good sense of your assets, both at the enterprise level and at the business unit level, so spend some time and think: Who on this list is the most likely agent for an attack? Assign a numerical value from 1 to 4, ranging from “least likely” to “somewhat likely” to “very likely” to “extremely likely.” Regarding my bias and recommendations, I'd consider the insider as a very likely agent, and money or extortion as the primary motive.

You now have an understanding of the threat agents and their motives as they might apply to your organization. This is an excellent first step, but you're far from finished. Knowing the who and the why of cyberattacks is not enough. You also need to know the how and the when.

First, the how. One of the best places to look for this type of information is the European Union Agency for Network and Information Security (ENISA). They have been putting together an annual threat landscape and trends report since 2012. At this stage in your process, this is required reading. The reports are excellent, succinct, and easily understood by both executives and cyberprofessionals alike. At the time of this writing, the most recent report was the 2015 edition, published in January 2016. In it, ENISA ranks the top 15 threats and compares them year over year with 2014. The top 10 are shown in Table 7.2.

Table 7.2 ENISA Table: Overview and Comparison of Cyberthreat Landscapes 2015 and 2014



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.