Risk Matrices, Lies, and Misconceptions

Part 1 - Understanding Measurement

There are 3 examples below. For each example, use what you learned in today’s lectures to meet the following goals:

  • Explain whether or not the example shown is a correct form of measurement
  • Explain what scale of measurement is being utilized in the given example
  • If the example shown is NOT a correct form of measurement, briefly explain how it is not properly conveying risk information
    Answer:
    The second one doesn’t have any time scale so there is no reference and at some point everything becomes 100% possible.

The last one has no reference so a medium for me could be a high for someone else.

Example 1:

Example 2:

Example 3:

Part 2 - Building Threat Profiles

Briefly research a known threat group then, using your new understanding of FAIR Threat Profiling, create a small table with the information broken down by threat capability, threat event frequency (go find statistics on frequency), Assets, Harm, etc. Doing this will teach you how to build a sound threat profile that will become increasingly relevant in your career from both a DFIR and Cybersecurity perspective.

Examples of Threat Groups to choose from:

  • ALPHV (BlackCat Ransomware)
  • Lapsus$
  • Conti
  • DarkSide
  • Lazarus Group

Threat Profile

TypeDefinition
MotiveTo take down or stall the sectors they target
Primary IntentDamage/Destroy
SponsorshipMost likely Russian backed
Preferred Target CharacteristicsEntries not in Russia that are critical infrastructure
Preferred TargetsDefense and aviation companies, government entities, companies related to industrial control systems, and critical infrastructure sectors
CapabilityVery high level and advanced attacks
Personal risk toleranceVery high
Concern for collateral damageVery high

FAIR Risk Factors

TComTEF MinTEF MLTEF MaxTCap MinTCap MLTCap Max
Cyber Criminal (Backed by Nation State)0.25 (Once in 3 years)3 (three times a year)6 (once every 2 months)758598

Hints and Helpful Tips

  • For Threat Event Frequencies, find data on your chosen threat group. Can you find data on attributed attacks? Maybe you can find news of attacks 10 times a year, maybe 10 times a month? Determine an average, a minimum, and a maximum from this data. These will be estimates
  • For Threat Capabilities, take a look at the tactics employed in any published breaches/attacks. Use your best judgment as to what levels of force, out of 100, your threat group is capable of employing against an asset. Do they have any instances of non-destructive attacks (1-10 TCap)? Do they have a history of destroying assets entirely (95-100 Tcap)? This will help you determine your minimum, “most likely”, and maximum capability levels.

Part 3 - Measurement and FAIR

Briefly reflect on how you can combine the two topics of measurement and threat profiling together to perform real-world risk analysis utilizing the FAIR model. How does measurement play a role in FAIR? Why does FAIR work in this regard when other models don’t?

Answer:
Measurement is key to FAIR modeling because it can show the frequency of a potential event occurring, potential loss in the event of an incident, and the degree of uncertainty associated with these factors. The FAIR model works well in this regard because it provides a systematic approach for measuring risk and combining threat profiling with quantitative risk analysis. Unlike other models that rely solely on qualitative assessments or subjective rankings. By combining threat profiling with quantitative risk analysis, the FAIR model enables organizations to identify and prioritize the most significant threats to their operations and develop targeted risk mitigation strategies to address those threats.