Cybersecurity Scoring in Plain English: On a Scale from One to Ten
Many readers have asked how to lay out threat severity (and what should be deflected) in a simple way. While I can’t claim to have all the answers there, I am reminded of what a good friend of mine (@snipeyhead on Twitter) once explained to me when I was starting out in Cybersecurity. She referenced a ten-point scale to spell out different levels of threat and threat preparedness to make the whole thing a lot more visible and easier to understand through cybersecurity scoring.
Start A Free Trial - Level 1: Non-Targeted “spray and pray” attacks like “blind email” attacks and SMS malicious spam – such as so-called “adult behavior extortion” attacks or fake money transfer schemes that are sent to half the internet and very rarely contain any non-public personal data at all.
- Level 2: False advertising of what a download really is – such as fake application downloads.
- Level 3: Non-Targeted phishing attacks – most commonly wide-scale provider spoofing as fake Netflix, IRS, and other emails trying to trick consumers into giving up login information.
- Level 4: Targeted blind email/SMS attacks – where all the employees of a specific company get a malicious email that includes public – but organization-specific – information within the email itself.
- Level 5: Targeted generic phishing – aimed at a specific industry but not personalized to the victim. A typical example is someone pretending to be the CEO or VP and asking for a gift card – they may have just enough information to do an accurate impersonation and win employee trust.
- Level 6: Co-opting legitimate software for illegitimate purposes, such as compromising a software vendor’s update systems and inserting a rogue update that users automatically download and apply.
- Level 7: Tailored email, text messaging, and phishing attacks – where the attack email is highly targeted to specific individuals and/or company principles and uses details that make the user who gets it significantly more likely to interact with it due to the targeted tailoring.
- Level 8: Organized multi-facet threat campaigns – REvil, Loki, and other Advanced Persistent Threat groups.
- Level 9: State-Sponsored attacks and acts of cyber-warfare – such as surgical strikes on critical infrastructure or enterprise businesses for political or hacktivism reasons or as part of a military operation.
- Level 10: Multiple party collusion – such as when a government either partners with or coerces a service provider to give them information.
- The vast majority of attacks can be defended against by any company or organization of just about any size. Anything up to Level 7 can be defeated with tools and training and can fit within most budgets. While an individual would have trouble defending against Level 4 and up, an organization can layer on the additional defenses necessary.
- For the few levels that are exceptionally difficult to defend against, the good news is that there are not a lot of these going on in the world. Though do occur, and sometimes even impact smaller businesses and individuals, they are nearly exclusively targeting enterprise organizations and/or entire countries.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe