Risk events are events that can occur and may cause consequences.
Risk events may lead to other risk events. For example a software exploit may lead to unauthorised access to a system.
We use a simple hierarchy to provide convenient groupings of events. We recommend using the framework at the appropriate level of granularity with regards to the risk scenarios being considered.
Indicative impacts on the information security goals of Confidentiality, Integrity and Availability have been added where appropriate.
External Risk Events
External Risk Events are events that may occur outside your scope of control but may still cause consequences for your organisation or it’s stakeholders.
|Service Compromise||Confidentiality, Integrity|
|Access to Our System Breach||Confidentiality, Integrity|
|Research||Critical Vulnerability Published|
Internal Risk Events
Internal Risk Events are events that may occur within your scope of control and cause consequences for your organisation or it’s stakeholders.
The Internal Risk Events are largely derived from this ENISA [PDF] review of CSIRT incident taxonomies across Europe.
|Level 1||Level 2||CIA|
|Abusive Content||Harmful Speech|
|Child / Sexual / Violent Content|
|Worm||Confidentiality, Integrity, Availability|
|Rootkit||Confidentiality, Integrity, Availability|
|Availability Interruption||Distributed / Denial of Service||Availability|
|Information Gathering||Open Source Intelligence Analysis||Confidentiality|
|Social Engineering||Lies||Confidentiality, Integrity|
|Information Breach||Unathorised access to system / component||Confidentiality, Integrity|
|Unauthorised access to information||Confidentiality|
|Unauthorised sharing of information||Confidentiality|
|Unauthorised modification of information||Integrity|
|Unauthorised deletion of information||Integrity, Availability|
|Fraud||Misappropriation / misuse of resources|
|Theft of money|
|System Intrusion||Software Exploit||Confidentiality, Integrity|
|SQL injection||Confidentiality, Integrity|
|Cross-site scripting (XSS)||Confidentiality, Integrity|
|File Inclusion||Confidentiality, Integrity|
|Control System Bypass||Confidentiality, Integrity|
|Use of stolen credentials||Confidentiality, Integrity|
|Password brute force||Confidentiality, Integrity|
|Governance Failure||Process failure||Confidentiality, Integrity|
|Audit Failure||Confidentiality, Integrity|