Special Report: The nature of cyber threat

Fig.1

Fig.1

The past ten years have seen a rapid growth in sophisticated cyber attacks targeting intellectual property and capability. Cyber attacks such as Ghostnet, Stuxnet, Flame, Zeus and Duqu have all targeted intellectual property or capability associated within an organisation or individual. The recent arrests of the people behind the Silk Road hacking site clearly indicates that the criminal supply chain supporting malicious activities on the internet is sophisticated and mature. In order for us to protect our systems against sophisticated threat actors (STAs), we need to develop a detailed understanding of the nature of threats and the lifecycle of a cyber attack.

The intentional threat agent is a party that knowingly sets out to cause damage or loss to a system. The following are examples of the intentional threat:

Threat type Threat description
Foreign agents These are people who professionally gather information and commit sabotage for governments.
Industrial or economic espionage Corporate or industrial espionage involves operations conducted by one corporation against another for the purpose of acquiring a competitive advantage in domestic or global markets.
Terrorists Terrorists use attacks to inflict fear and to achieve either social or political change.
Organised
crime
This threat arose because organised crime has realised that information has a distinct financial value attached to it and that information technology can be used to hide criminal activities.
Insiders The biggest threat that any organisation faces is from its own employees. There are many documented cases where employees have sabotaged, modified or stolen information belonging to their employing organisation.
Hackers and crackers This class of threat is often referred to as cyber-vandals. The image is generally that of a teenager breaking into a system for the fun of it and the recognition of his peers.
Political dissidents These are people who are attempting to use information and information technology to achieve a political objective.
Vendors and suppliers Vendors and suppliers are now integrated into the fabric of most organisations; for example, when we outsource IT functions to a third party, the security of the outsourcing organisations becomes critically dependent upon the security of the third party.

Table 1 – Threat types and description

The problem that we face when dealing with threats and threat agents is the question of measurement. The potential of a threat agent to pose an actual threat to an information infrastructure will be influenced by a number of factors. In reality, for the threat agent to pose a real threat to an information infrastructure, the agent must possess a capability and must also be able to gain either physical or electronic access. Its level of capability will influence the impact that such a threat agent will have. The threat agent will be weakened by factors that will inhibit its ability to form a threat and will be strengthened by other factors. In addition, there will be some type of catalyst that will cause the threat agent to act, depending on his or her motivation. The components of ‘threat’ that apply to a malicious threat and their interrelationships are detailed in Fig. 1.

Threat agent

The threat agent element expands into the types of threats that may be seen. These have, for convenience and because they can be dealt with in a number of very different ways, been subdivided into two different groups: the natural threat agents and the malicious threat agents. These are a relatively well-understood set of threats, and there is actuarial history of the effects of fire, wind, water and earthquake components that is based on long-established experience within the insurance industry. A malicious threat can be divided into the categories defined in Table 1.

Capability

In order for a malicious threat agent to be effective, he or she must have the capability to conduct and sustain an attack or to totally destroy the system and any replacement. The components of a capability can be divided into the following categories: a) software, b) technology, c) facilities, d) education and training, e) methods and f) books and manuals. For malicious threat agents to carry out an attack, they must have the means and the necessary skills and methods to be successful. We can also measure capability as a maturity function.

Capability level Threat capability description
1 (Very low) This type of capability is associated with little technical knowledge and the use of open source tools and scripts.
2 (Low) This type of capability is associated with limited technical knowledge and the use of open source tools and commercial tools.
3 (Medium) This type of capability is associated with good technical knowledge and the use of open source tools and commercial tools in a repeatable manner.
4 (High) This type of capability is associated with sophisticated threat actors backed with a good knowledge development capability and reasonable resources.
5 (Very high) This type of capability is associated with national state actors with unlimited funds and backed by a sophisticated research and development infrastructure. This type of threat capability is typically attributed to a foreign intelligence service.

Threat inhibitors

A threat inhibitor is any factor that decreases either the likelihood of an attack taking place or the likelihood of an attack being successful. Of the factors that were identified, those that are detailed below were considered to be the most significant. Taking each of these factors in turn:

Threat amplifiers

A threat amplifier is any factor that increases either the likelihood of an attack taking place or the likelihood of the attack being successful. Of the factors that were identified, those that are detailed below were considered to be the most significant. Taking each of these factors in turn:

  1. If the laws within the target country or the country from which the threat agent is operating are perceived to be weak or not relevant to the types of activity that the attackers are using;
  2. If the laws that are being used have not been tested in the courts or have been tested and shown to be ineffective; and
  3. If the law enforcement community is seen to be reluctant in its application of the law, this will act as an amplifying factor.

Threat catalysts

Threat catalysts are those factors or actions that cause an attack to be initiated at the time and on the target that is selected. Again, the catalyst may be either real or perceived. The main groupings of threat catalysts have been identified as:

Threat agent motivators

The factors and influences that motivate a threat agent are diverse and may operate singly or in unison. The primary groupings of threat agent motivators are detailed below, together with a general description. The main motivational factors are:

Summary and conclusions

In this paper I have outlined the various elements associated with the nature of threat. In particular, I have presented a structured framework within which research and development activities can be placed and structured so as to have the best impact against an adversary. The goal of this framework is to allow people to develop and deploy capability that best mitigates threats.

Professor Andrew Blyth
School of Computing
University of South Wales
tel: +44 (0)845 576 7778

http://www.southwales.ac.uk