Home > Research > Publications & Outputs > Anticipating Adversary Cost: Bridging the Threa...

Electronic data

Text available via DOI:

View graph of relations

Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment

Research output: ThesisDoctoral Thesis

Published

Standard

Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment. / Derbyshire, Ric.
Lancaster University, 2022. 222 p.

Research output: ThesisDoctoral Thesis

Harvard

APA

Vancouver

Derbyshire R. Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment. Lancaster University, 2022. 222 p. doi: 10.17635/lancaster/thesis/1685

Author

Bibtex

@phdthesis{55d105235848485083841ab4387e7ebd,
title = "Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment",
abstract = "Digital computers have become commonly used in the workplace, with many organisations connecting them to the Internet to address the challenges of an increasingly globalised economy. Although this connectivity allows for a greater reach, it also brings with it a growing attack surface by way of cyber attacks. Cyber security, the discipline of combatting cyber attacks, relies on cyber risk assessment as a mechanism for understanding such attacks, decomposing the complexities into the components - threat, vulnerability, and impact. Thesecomponents are considered and combined in various ways to derive some notion of cyber risk posed by a threat, that may exploit a vulnerability within an asset, and cause an impact to the victim organisation. However, focus is often put onto the latter two components of cyber risk, vulnerability and impact, due to the assessor being able to gather data about them reliably. Therefore, due to the scarcity of data and resultant lack of focus, threat is often consideredin isolation and is based upon speculation using weak or no data. The effect of this is that cyber risk assessment recipients do not fully gain the context of a threat in relation to their systems, leading to suboptimally informed decision making. Furthermore, many cyber risk assessment outputs are delivered in a qualitative or semi-quantitative format, incongruous with the output of other business functions, particularly at board level.Through an empirical study with expert industry practitioners, this thesis first confirms the gap identified within the literature and validates adversary cost as an appropriate area of research to address it. A study of cyber security attack taxonomies is conducted to develop an understanding a cyber attack{\textquoteright}s composition, before selecting the MITRE ATT&CK{\textregistered} framework as a foundational structure on which to base the concept of adversary cost. Another empirical study, using a practical ethnographic approach with expert offensive cybersecurity professionals, decomposes adversary cost into its three constituent factors considered by adversaries - time, finance, and risk. The adversary cost framework is then proposed, drawing on pragmatic methods of quantification from existing literature to guide a cyber risk assessment practitioner to utilise their existing data to quantify the time and finance costs an adversary may experience for a given cyber attack narrative. A final empirical study with expert cyber risk assessment practitioners is conducted to evaluate the adversary costframework{\textquoteright}s validity and utility.",
author = "Ric Derbyshire",
year = "2022",
doi = "10.17635/lancaster/thesis/1685",
language = "English",
publisher = "Lancaster University",
school = "Lancaster University",

}

RIS

TY - BOOK

T1 - Anticipating Adversary Cost: Bridging the Threat-Vulnerability Gap in Cyber Risk Assessment

AU - Derbyshire, Ric

PY - 2022

Y1 - 2022

N2 - Digital computers have become commonly used in the workplace, with many organisations connecting them to the Internet to address the challenges of an increasingly globalised economy. Although this connectivity allows for a greater reach, it also brings with it a growing attack surface by way of cyber attacks. Cyber security, the discipline of combatting cyber attacks, relies on cyber risk assessment as a mechanism for understanding such attacks, decomposing the complexities into the components - threat, vulnerability, and impact. Thesecomponents are considered and combined in various ways to derive some notion of cyber risk posed by a threat, that may exploit a vulnerability within an asset, and cause an impact to the victim organisation. However, focus is often put onto the latter two components of cyber risk, vulnerability and impact, due to the assessor being able to gather data about them reliably. Therefore, due to the scarcity of data and resultant lack of focus, threat is often consideredin isolation and is based upon speculation using weak or no data. The effect of this is that cyber risk assessment recipients do not fully gain the context of a threat in relation to their systems, leading to suboptimally informed decision making. Furthermore, many cyber risk assessment outputs are delivered in a qualitative or semi-quantitative format, incongruous with the output of other business functions, particularly at board level.Through an empirical study with expert industry practitioners, this thesis first confirms the gap identified within the literature and validates adversary cost as an appropriate area of research to address it. A study of cyber security attack taxonomies is conducted to develop an understanding a cyber attack’s composition, before selecting the MITRE ATT&CK® framework as a foundational structure on which to base the concept of adversary cost. Another empirical study, using a practical ethnographic approach with expert offensive cybersecurity professionals, decomposes adversary cost into its three constituent factors considered by adversaries - time, finance, and risk. The adversary cost framework is then proposed, drawing on pragmatic methods of quantification from existing literature to guide a cyber risk assessment practitioner to utilise their existing data to quantify the time and finance costs an adversary may experience for a given cyber attack narrative. A final empirical study with expert cyber risk assessment practitioners is conducted to evaluate the adversary costframework’s validity and utility.

AB - Digital computers have become commonly used in the workplace, with many organisations connecting them to the Internet to address the challenges of an increasingly globalised economy. Although this connectivity allows for a greater reach, it also brings with it a growing attack surface by way of cyber attacks. Cyber security, the discipline of combatting cyber attacks, relies on cyber risk assessment as a mechanism for understanding such attacks, decomposing the complexities into the components - threat, vulnerability, and impact. Thesecomponents are considered and combined in various ways to derive some notion of cyber risk posed by a threat, that may exploit a vulnerability within an asset, and cause an impact to the victim organisation. However, focus is often put onto the latter two components of cyber risk, vulnerability and impact, due to the assessor being able to gather data about them reliably. Therefore, due to the scarcity of data and resultant lack of focus, threat is often consideredin isolation and is based upon speculation using weak or no data. The effect of this is that cyber risk assessment recipients do not fully gain the context of a threat in relation to their systems, leading to suboptimally informed decision making. Furthermore, many cyber risk assessment outputs are delivered in a qualitative or semi-quantitative format, incongruous with the output of other business functions, particularly at board level.Through an empirical study with expert industry practitioners, this thesis first confirms the gap identified within the literature and validates adversary cost as an appropriate area of research to address it. A study of cyber security attack taxonomies is conducted to develop an understanding a cyber attack’s composition, before selecting the MITRE ATT&CK® framework as a foundational structure on which to base the concept of adversary cost. Another empirical study, using a practical ethnographic approach with expert offensive cybersecurity professionals, decomposes adversary cost into its three constituent factors considered by adversaries - time, finance, and risk. The adversary cost framework is then proposed, drawing on pragmatic methods of quantification from existing literature to guide a cyber risk assessment practitioner to utilise their existing data to quantify the time and finance costs an adversary may experience for a given cyber attack narrative. A final empirical study with expert cyber risk assessment practitioners is conducted to evaluate the adversary costframework’s validity and utility.

U2 - 10.17635/lancaster/thesis/1685

DO - 10.17635/lancaster/thesis/1685

M3 - Doctoral Thesis

PB - Lancaster University

ER -