Threat Modeling

Threat Modeling, Zero to Hero

Threat Identification and Stakeholder Interview

Introduction

Interviewing stakeholders regarding their understanding of the applicable threat agents:

Taxonomy of Potential Threat Agents

Threat SourceMotivationThreat ActionsLowModHighCritical
Hacker, CrackerChallenge, Ego, RebellionSystem Intrusion
Computer CriminalDestruction or alteration of InformationFraud, Crime, Stalking
EspionageCompetitive or economic advantageAccess to proprietary information
AnarchistRejection of structureViolence, disruption, destruction
Civil ActivistHighly motivated but non-violentTheft of data, electronic or business disruption
CompetitorBusiness adversary competing for revenueTheft of intellectual property or business data
Corrupt Government OfficialAcquiring company resources illigitimatelyOrganizational or physical business disruption
Cyber VandalDerivates thrill from intrusionMalware, computing disruption
Data MinerProfessional data gatherer externalTheft of intellectual property and business data
Employee, DisgruntledCurrent or former employee intent to cause harmAbuse of access, blackmail, theft, data corruption
Government SpyState sponsored spy supporting idealistic goalsTheft of intellectual property or business data
Government Cyber WarriorNational scale state-sponsored attackSevere business infrastructure disruption
Internal SpyProfessional data gatherer as trusted insiderTheft of intellectual property personal or businesss data
Irrational IndividualIrrational or person with illogical purposePersonal violence resulting in business disruption
Legal AdversaryAdversary in legal proceedings, warranted or notOrganizational business disruption access to business data
MobsterOrganized crime boss with significant resourcesTheft of intellectual propery, personal information, violence
Radical ActivistHighly motivated destructive supporer of a causeProperty destruction, physical business disruption
Sensationalist"15 moments of fame" motivated, notorietyPublic announcements for public relations crisis, data theft
TerroristViolence for social-political agenda, revengeViolence, property and physical business disruption
ThiefOpportunistic individual profit motivatedTheft of hardware and intellctual property
VendorBusiness partner who seeks inside informationTheft of intellctual property or business data
Employee, RecklessEmployee who bypasses safeguards for expediencyBenign shortcuts, misuse of auth, "pushed wrong button"
Employee, UntrainedWith harmless intent unknowingly misues systemPoor process, unforseen mistakes, "pushed wrong button"
Information PartnerVoluntary sharing of sensitive informationPoor internal protection of company proprietary materials

Remember the Axioms of Traditional Intelligence

Risk Assessment Process

Risk Assessment Process