Threat

Threats exploit asset vulnerabilities and create impact. The interactions between assets, threats, and vulnerabilities are analysed during risk management.

It is impossible for an organisation to completely exclude the existence of threats. In terms of security, we therefore generally apply EBIOSv2.

EBIOSv2

EBIOS: Expression of Needs and Identification of Security Objectives (Expression des Besoins et Identification des Objectifs de Sécurité).

Threats by Groups

EBIOSv2 [1] offers a list of generic Threatening Agents (e.g. threats):

PHYSICAL DAMAGE

NATURAL EVENTS

LOSS OF ESSENTIAL SERVICES

DISTRIBUTION DUE TO RADIATION

COMPROMISING INFORMATION

TECHNICAL FAILURES

UNAUTHORISED ACTIONS

Threat Qualification

EBIOSv2 threats can be classified according to:

THEIR ORIGIN

THEIR ATTACK

THEIR TYPE

This section refers to the generic vulnerabilities of the EBIOS v2 document - Section 4 - Tools (Assessment).

We can identify:

Security Goals

Section 2 Generic security objectives of the EBIOS v2 document - Section 5 - Tools (Processing) [4] proposes for each of the 7 types of high-level entities/assets a list of generic security objectives effectively addressing the identified generic vulnerabilities previously.

Section 3.2 Requirements from ISO 17799 of the same EBIOS v2 document - Section 5 - Tools (Processing) [5] proposes safety requirements related to each of the clauses of ISO/IEC 17799: 2000 (and not the version of the standard published in 2005 ISO/IEC 27002: 2005).

EBIOS 2010

EBIOS 2010 [6] offers a different presentation from version 2, both in terms of the presentation of threats and the overall approach.

EBIOS 2010 is divided into the following areas:

TYPES OF SUPPORT GOODS

IMPACTS

SOURCES OF THREATS

MEHARI Threats by Threat Group