Skip to content

Latest commit

 

History

History
73 lines (56 loc) · 2.98 KB

03-a-events.md

File metadata and controls

73 lines (56 loc) · 2.98 KB

Risk Events

Risk events are events that can occur and may cause consequences.

Risk events may lead to other risk events. For example a software exploit may lead to unauthorised access to a system.

We use a simple hierarchy to provide convenient groupings of events. We recommend using the framework at the appropriate level of granularity with regards to the risk scenarios being considered.

Indicative impacts on the information security goals of Confidentiality, Integrity and Availability have been added where appropriate.

External Risk Events

External Risk Events are events that may occur outside your scope of control but may still cause consequences for your organisation or it's stakeholders.

Level 1 Level2 CIA
Supplier Service Unavailability Availability
Service Compromise Confidentiality, Integrity
Information Breach Confidentiality
Access to Our System Breach Confidentiality, Integrity
Compliance Failure
Regulatory Rules Change
Research Critical Vulnerability Published

Internal Risk Events

Internal Risk Events are events that may occur within your scope of control and cause consequences for your organisation or it's stakeholders.

The Internal Risk Events are largely derived from this ENISA [PDF] review of CSIRT incident taxonomies across Europe.

Level 1 Level 2 CIA
Abusive Content Harmful Speech
Child / Sexual / Violent Content
Harassment
Malware Ransomware Availability
Worm Confidentiality, Integrity, Availability
Spyware Confidentiality
Rootkit Confidentiality, Integrity, Availability
Dialler
Availability Interruption Distributed / Denial of Service Availability
Sabotage Integrity, Availability
Information Gathering Open Source Intelligence Analysis Confidentiality
Network Scanning
Network Sniffing Confidentiality
Social Engineering Lies Confidentiality, Integrity
Threats Confidentiality, Integrity
Phishing Confidentiality, Integrity
Bribes Confidentiality, Integrity
Information Breach Unathorised access to system / component Confidentiality, Integrity
Unauthorised access to information Confidentiality
Unauthorised sharing of information Confidentiality
Unauthorised modification of information Integrity
Unauthorised deletion of information Integrity, Availability
Fraud Misappropriation / misuse of resources
False representation
Theft of money
System Intrusion Software Exploit Confidentiality, Integrity
SQL injection Confidentiality, Integrity
Cross-site scripting (XSS) Confidentiality, Integrity
File Inclusion Confidentiality, Integrity
Control System Bypass Confidentiality, Integrity
Use of stolen credentials Confidentiality, Integrity
Password brute force Confidentiality, Integrity
Governance Failure Process failure Confidentiality, Integrity
Audit Failure Confidentiality, Integrity