Cybersecurity Program Development for Business by Chris Moschovitis
Author:Chris Moschovitis
Language: eng
Format: epub
ISBN: 9781119430001
Publisher: Wiley
Published: 2018-05-08T00:00:00+00:00
Threat Rankings
Your next task is to rank the preceding list in terms of which actors and motives are most likely to be engaged in your world. You have a good sense of your assets, both at the enterprise level and at the business unit level, so spend some time and think: Who on this list is the most likely agent for an attack? Assign a numerical value from 1 to 4, ranging from “least likely” to “somewhat likely” to “very likely” to “extremely likely.” Regarding my bias and recommendations, I'd consider the insider as a very likely agent, and money or extortion as the primary motive.
You now have an understanding of the threat agents and their motives as they might apply to your organization. This is an excellent first step, but you're far from finished. Knowing the who and the why of cyberattacks is not enough. You also need to know the how and the when.
First, the how. One of the best places to look for this type of information is the European Union Agency for Network and Information Security (ENISA). They have been putting together an annual threat landscape and trends report since 2012. At this stage in your process, this is required reading. The reports are excellent, succinct, and easily understood by both executives and cyberprofessionals alike. At the time of this writing, the most recent report was the 2015 edition, published in January 2016. In it, ENISA ranks the top 15 threats and compares them year over year with 2014. The top 10 are shown in Table 7.2.
Table 7.2 ENISA Table: Overview and Comparison of Cyberthreat Landscapes 2015 and 2014
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Hit Refresh by Satya Nadella(8855)
The Compound Effect by Darren Hardy(8513)
Change Your Questions, Change Your Life by Marilee Adams(7377)
Nudge - Improving Decisions about Health, Wealth, and Happiness by Thaler Sunstein(7244)
The Black Swan by Nassim Nicholas Taleb(6770)
Deep Work by Cal Newport(6563)
Daring Greatly by Brene Brown(6227)
Rich Dad Poor Dad by Robert T. Kiyosaki(6179)
Principles: Life and Work by Ray Dalio(5961)
Man-made Catastrophes and Risk Information Concealment by Dmitry Chernov & Didier Sornette(5650)
Playing to Win_ How Strategy Really Works by A.G. Lafley & Roger L. Martin(5506)
Digital Minimalism by Cal Newport;(5392)
Big Magic: Creative Living Beyond Fear by Elizabeth Gilbert(5353)
The Myth of the Strong Leader by Archie Brown(5239)
The Slight Edge by Jeff Olson(5200)
Discipline Equals Freedom by Jocko Willink(5157)
The Motivation Myth by Jeff Haden(5004)
Stone's Rules by Roger Stone(4859)
The Laws of Human Nature by Robert Greene(4774)
