Cybersecurity Personas, Use Cases, and Access Patterns

Jack Krupansky
80 min readJun 14, 2018

--

In order to properly put cybersecurity in context, it is important to understand the many use cases and access patterns of the many personas using modern connected digital systems.

This informal paper covers both cybersecurity professionals and all other individuals and groups whose daily lives have some cybersecurity aspect even if they themselves are not a cybersecurity professional. This includes technical workers, nontechnical workers, managers, executives, users, consumers, government workers, children, teenagers, the elderly — anybody who uses a computer or computing device and the Internet.

Introduction to personas, use cases and access patterns

A persona is simply a type of person who has a type of role. They may have a worker role, a consumer role, or maybe a management role, as just a few examples.

An access pattern is a type of operation, function, activity, or task that a person (persona) is performing. Sending or receiving an email message, posting on social media, or buying something online are examples of access patterns.

A use case is a type of larger context for the objectives or purpose for which a person (persona) is engaging in activities and tasks (access patterns.) Email, social media, ecommerce, business applications, and industrial process control are examples of use cases.

Personas are especially significant since different personas have different interests and needs in the cybersecurity domain. Consumers, employee end users, IT staff, security experts, and management all have very important roles in cybersecurity, but they are all approaching the same core problem from widely varying perspectives.

Cybersecurity is a multifaceted problem, each facet having unique even if overlapping requirements.

For example, training. Everybody needs it, and even though there is indeed overlap, each facet or persona needs its own special focus. There is not and cannot be a single, one-size-fits-all training program for cybersecurity. Some people have deeper needs and stronger interests, while others have lesser needs and interests or more limited attention spans. To each his own.

Different personas have different degrees of focus on cybersecurity. For some, it is a full-time job. For others, it is a part-time job but a very significant portion of their time. While for others, it is only a modest fraction of their time. And for many, it is a relatively insignificant portion of their time, energy, and attention and focus. At least until something goes horribly wrong.

Similar for use cases. Yes, there is overlap, but email, identity management, social media, network security, endpoint management, physical machine security, and remote command access are all fairly distinct cases.

Similar for access patterns, the specific operations, activities, and tasks that the many personas perform when using connected digital systems. There can be significant overlap for access patterns between personas and use cases, but there are many distinctive access patterns peculiar to specific personas or use cases.

Audience — baseline foundation reference

This paper, as informal as it is, is still much too dense for casual readers.

It is intended as a baseline foundation reference for anybody seeking a deep foundation upon which to build a strategy for dealing with cybersecurity.

It is not the only reference needed, but one of the references.

For example, the NIST frameworks, among others, are essential baseline references as well:

  1. National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
  2. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.

They are good, but focus more on the specific needs of cybersecurity professionals, while this paper covers all other roles as well.

Relation to NIST NICE Cybersecurity Workforce Framework

The National Institute of Standards and Technology (NIST) has a framework called the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, or NICE Framework or just NICE for short, which categorizes and describes cybersecurity work.

A key difference between the focus of NICE and this paper is that NICE is limited to only workers in the field of cybersecurity, cybersecurity professionals, whereas this paper also focuses on all other workers outside of cybersecurity per se but who are even tangentially or remotely involved or even merely impacted by cybersecurity.

As per NIST,

For a general overview of NICE, see:

For the actual NICE Framework, see:

This paper includes the NICE concept of work roles within personas, and the concept of tasks under access patterns.

Some of the categories of common cybersecurity functions and specialty areas of cybersecurity work from NICE are covered by use cases and access patterns in this paper. Many others are simply beyond the scope of this paper and amply covered by NICE anyway.

The knowledge, skills, and abilities areas of NICE, as well as most tasks of NICE are specific only to cybersecurity professionals and are thus beyond the scope of this paper.

An accurate statement would be that NICE and this paper intersect or overlap.

Another way of putting it is that NICE and this paper complement each other.

Again, the majority of personas, use cases, and access patterns of this paper are beyond the scope of NICE since they involve workers and non-workers who are not dedicated cybersecurity professionals.

Beyond the scope of this paper

There are very important aspects of cybersecurity which are beyond the limited scope of this paper. Many of them are adequately covered elsewhere already, and many are deserving of better coverage eventually, just not here and now. They include:

  1. Vulnerabilities, exploits, and threats. This paper does not attempt to catalog all vulnerabilities, exploits, and threats per se. The focus is on people and activities which could be threatened or attacked. Use cases and access patterns will include some but not all vulnerabilities. The goal here is to summarize legitimate activities and actions which can be compromised and are in need of being protected from attack.
  2. Defense. The many methods and mechanisms for defending against cyberattacks.
  3. Response. The various responses to cyberattacks.
  4. Recovery. The various methods and processes for restoring normal operation after a cyberattack.
  5. Best practices. Specific and general technical and management methods and processes.
  6. Frameworks. General guidance on approaches to cybersecurity.
  7. Standards. Codified best practices.
  8. Certification. Testing and validation of knowledge and expertise of practitioners.
  9. Job titles.
  10. Competencies.
  11. Degree of knowledge and expertise.
  12. Awareness level.
  13. Knowledge level.
  14. Skill level.
  15. Ability level.
  16. Experience level.
  17. Competence level.
  18. Competence span.
  19. Confidence level.
  20. Attention level.
  21. Career development.
  22. Specific training. Beyond highlighting need to uniquely train each specific persona.

Some of these aspects will frequently appear in personas, use cases, and access patterns, but only to a limited degree, designed to illustrate rather than to offer comprehensive coverage.

Also see the NIST Frameworks for coverage of some of these aspects of cybersecurity:

  1. National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
  2. National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.

Cybersecurity affects everything for everyone in every way

Unlike most narrow, specialized domains where relatively short lists of personas, use cases, and access patterns can readily be identified, cybersecurity applies to everything, for everyone, in every way.

  • Everybody has data of some form. Or somebody has data about them.
  • Everybody has connected access to the Internet. Or patronizes some business or government service which is connected.
  • Every organization has data.
  • Every organization has services connected to the Internet.
  • Every organization is connected to the Internet.
  • Every form of access to every form of data, services, and code has cybersecurity vulnerabilities.

Okay, yes, sure, there are always exceptions to every general rule.

Yes, there are people who do not use the Internet, but how many of them don’t make use of businesses or government agencies which maintain data about them that might be on a computer — and could conceivably be compromised?

And, sure, there are some, few, very small businesses who don’t use the Internet in any way, but do they also refrain from using banks, which might keep some data on the Internet?

And, some older, legacy computers are not connected to the Internet.

Fine, yes, there will be exceptions, but the general rule remains intact and valid — virtually everyone and everything is affected by data and cybersecurity in at least some way.

In short, everyone belongs in one or more personas in the domain of cybersecurity.

Tale of two circles — the little circle and the big circle

As mentioned at the start, this paper covers both cybersecurity professionals and everybody else who uses a computer or computing device, or interacts with an organization which does so, directly or indirectly. The former can be referred to as the little circle and the latter as the big circle.

The little circle, cybersecurity professionals, is the more limited subset of all individuals and groups using computers and the Internet.

The big circle is everyone, but does include cybersecurity professionals as well.

The point is that there are times, situations, personas, use cases, and access patterns, where it makes sense to refer to only cybersecurity professionals, but generally we need to refer to everybody, whether a cybersecurity professional or not, as well.

What’s a computer?

We need to be a little careful with terminology here, especially since a lot of computing devices that access the Internet are not so clearly computers per se.

There are really three distinct terms:

  1. Computer.
  2. Computing device.
  3. Non-computing device or object which contains an embedded computer or computing device.

This paper will refer to all three as a computer even though that might be technically a tad inaccurate.

Some obvious cases of computers:

  1. Desktop computer.
  2. Laptop computer.
  3. Server computer.
  4. Tablet computer.

Some less obvious cases of a computer:

  1. Smart phone.
  2. Smart refrigerator.
  3. Driverless car.
  4. Every motor vehicle.
  5. Kiosks.
  6. Speaking or active toys, dolls, and stuffed animals.
  7. Robots.

Those lists are not meant to be exhaustive, merely illustrative.

Any of these objects or devices which can be connected to the Internet in some way are relevant to this paper.

Endpoints, servers, and routers

Not to oversimplify networking too much, but there are three basic components to a network:

  1. Servers. The main computers where the real, heavy work gets done and data is stored.
  2. Endpoints. Whatever device a user is using to access the network. Personal computers, tablets, smartphones. To be clear, endpoints are computers.
  3. Routers. Specialized computers which direct traffic in the network.

Beyond those three primary components, a network also involves:

  1. Cables. To connect all devices. Copper wire, coaxial cable, ethernet cable, optical fiber cable.
  2. Power distribution.
  3. Heating and air conditioning.
  4. Facilities. Buildings. Data centers.

What is IT?

IT stands for Information Technology, which is basically any group which provides technical support for computing for an organization. That includes computer systems and other computing devices, networking, and software

It may be a separate group or division or may be subsidiary to a business unit.

The major components of IT are:

  1. Technical staff.
  2. Management.
  3. Computer systems and computing devices. And any related hardware and software.
  4. Applications development. May be embedded within IT or be separate group(s).
  5. Networking and communications. Routers, cables, and connections to external communications networks.
  6. Facilities to house, power, cool, and connect computing systems.

What is OT?

OT stands for Operational Technology, which is computer systems, software, and specialized hardware used to monitor and control physical systems and devices in the real world. IT is concerned with information alone while OT is concerned with effects in the physical environment.

Industrial control systems are the the primary example of OT. Monitoring and control of infrastructure is the general responsibility of OT.

See the Use case — Infrastructure, Use case — Internet of Things (IoT) Devices, and Use case — Vehicles sections for more detail.

What is a cyber service?

As used in this paper, a cyber service is an online, web, Internet service which provides some service(s) or set of online features to users.

Cyber services can include:

  1. Basic web pages providing information and media.
  2. Simple transactions.
  3. E-commerce transactions.
  4. Interactive applications. Either web-based or downloadable apps for smartphones and tablets.
  5. APIs. Application Programming Interfaces which allow external or internal applications to interface with services running on servers within the organization or in the cloud.

In the context of this paper we are interested in both:

  1. Organizations which provide cyber services.
  2. Organizations which use cyber services. Either provided internally, or provided by external organizations.

Personas

Personas are more correctly referred to as archetypes, or also as roles, work roles, actors, stakeholders, or audiences.

Each persona represents a type of individual, group, or organization.

Each persona has its own interests, own needs, and own abilities to comprehend and deal with technical details.

A particular individual, group, or organization may belong to or be covered by any number of personas, each persona being a role. In other words, a particular individual, group, or organization may play any number of roles, possibly at different times or in different situations, or possibly at the same time and even in the same situation.

Since the list of personas effectively covers everyone, it makes sense to divide the full universe of personas into sensible categories.

Persona vs. work role

The term work role may seem especially appealing, but some of the personas, notably consumers, may not have a work role per se.

Employees vs. workers

It is tempting to use the term employee to refer to people working within an organization, but not everybody working within an organization is strictly speaking an employee, but they are all workers.

Workers within an organization include:

  1. Full-time employees.
  2. Part-time employees.
  3. Contract workers.
  4. Vendor employees (or workers.)
  5. Temporary workers (temps.)
  6. Visitors. May not be workers per se, but may have at least limited access to network services within the organization, such as Wi-Fi networks.

Workers vs. managers

It is also frequently useful to distinguish workers from managers:

  1. Team leaders.
  2. Technical managers.
  3. Managers.
  4. Senior managers and directors.
  5. Junior executives.
  6. Executives.
  7. Senior executives.
  8. Board of directors.
  9. Advisors to management.

But in most contexts managers are workers or employees as well.

Users vs. consumers

Generally speaking, consumers are users, but workers within organizations are users but not with the role of consumers while they are performing tasks on behalf of the organization.

The term user will be used for either:

  1. Workers using systems within an organization.
  2. Individuals using web services.

The term consumer is used to draw attention to the fact that the requirements and training for a consumer are generally distinctly less than for a worker in an organization.

Children, the disabled, elderly, the incarcerated, etc. would generally be consumers and not workers.

Persona categories

Personas can be broadly classified into categories, and each persona category can be subdivided into particular personas, where each persona has its own distinctive qualities.

  1. Users. Consumers, citizens, business workers, non-commercial organization workers, government workers, contractors, and consultants.
  2. Non-IT workers. Having some cybersecurity role distinct from merely being a user, similar for business, government, and non-commercial organizations. Non-IT staff.
  3. Non-IT management. May or may not have a direct cybersecurity role, similar for business, government, and non-commercial organizations. Non-IT staff.
  4. Senior executives. May or may not have a direct cybersecurity role — set priorities, budgeting, and allocating resources, similar for business, government, and non-commercial organizations. Includes board of directors. Non-IT staff.
  5. Executive assistants. Perform tasks on behalf of executives. May in fact be more savvy than their bosses in many cases when it comes to using technology.
  6. Management for cyber services. Business units which offer cyber services to customers, or for internal use within the organization.
  7. Senior executives for cyber services. Business units which offer cyber services to customers. Includes board of directors.
  8. IT staff. Responsible for technical aspects of computing systems which a business, government agency, or non-commercial organization deploys, including cybersecurity. Management and executives as well.
  9. IT technical staff. IT staff focused on technical expertise. Excludes IT management.
  10. Cybersecurity technical staff. Subset of IT technical staff who have a dedicated or major cybersecurity role. Will be cybersecurity professionals.
  11. Cybersecurity professionals. Synonym for cybersecurity staff, or anyone who has a significant cybersecurity role and appropriate level of cybersecurity training and possibly even formal certification.
  12. IT management. All levels of management on the IT staff.
  13. Cybersecurity management. All levels of management on the IT staff who are dedicated to cybersecurity roles and manage the cybersecurity technical staff.
  14. Chief Cybersecurity Officer. The most senior cybersecurity professional (technical, management, or executive) in an organization.
  15. Physical security staff. Staff responsible for ensuring that no one is permitted to improperly gain physical access to systems, which might permit them to bypass some or all software cybersecurity defenses.
  16. Application software developers. IT staff or separate group(s) focused on developing and maintaining application software which will have some degree of cybersecurity impact, similar for business, government, non-commercial organizations, and application software vendors selling application software to other organizations.
  17. Insider threats. Any worker with access to systems within the organization who seeks to attack or improperly exploit the organization in some way.
  18. Consultants. Both technical and management.
  19. Cybersecurity consultants.
  20. Industries. Particular industries may face distinct or common cybersecurity issues.
  21. Standard setting organizations. Plenty of opportunity for addressing aspects of cybersecurity.
  22. Computing researchers. Need to be aware of cybersecurity aspects of their work.
  23. Cybersecurity researchers. Computing researchers whose main focus is cybersecurity.
  24. Cybersecurity product vendors. Firms which design, develop, manufacture, distribute, deploy, and support software or hardware products which provide cybersecurity features for organizations.
  25. Cybersecurity service providers. Firms which provide cyber services which provide cybersecurity features for organizations.
  26. Computer system vendors. Traditional computer companies. Or systems integrators. May or may not integrate and ship cybersecurity features with their systems.
  27. Computing service providers. Cloud computing and utility computing. Such as Amazon Web Services, Microsoft Azure, or comparable services from Google, IBM, etc.
  28. Software tool providers. May have some degree of cybersecurity impact.
  29. Cybersecurity tool providers. May not be full products as with cybersecurity product vendors, but building blocks for organizations to put together their own cybersecurity solutions.
  30. Application software vendors. Besides all of their internal cybersecurity issues, they also have a variety of obligations and liabilities to the organizations which acquire their application software.
  31. Vendors. Any other firm which an organization is dependent upon but does not have any significant control over, but might have a cybersecurity vulnerability.
  32. Customers and clients. Individuals and organizations with data, money, other property, or some vested interest in an organization.
  33. Shareholders and investors. Anyone with an ownership stake and an interest in the value of the firm. And an interest in the risks and liabilities of the firm, including and especially cybersecurity.
  34. Think tanks. With a policy interest in cybersecurity or even technology in general.
  35. Educators and trainers. Academic and commercial focus on workforce development. Both general education and technology, including cybersecurity, either directly or use of computing technology that has aspects of cybersecurity.
  36. Students.
  37. Lawyers. Must understand law related to cybersecurity.
  38. Regulators. Assure that regulated organizations address cybersecurity risks adequately.
  39. Government leaders. National, state or regional, local — set priorities, budgeting, and allocating resources.
  40. Government agencies. Generally the same interests and needs as users, workers, management, executives, and IT staff at any business, enterprise, or non-commercial organization.
  41. Legislators. Creating and updating cyber-related law (what’s illegal, penalties, granting immunities to facilitate protection) and budgeting (protection of government services, regulation, and sponsoring research.)
  42. Courts. Criminal and civil (business and personal.)
  43. Law enforcement. Local, state, FBI, Homeland Security (education, monitoring, guidance, assistance) and international (INTERPOL, cooperation with other countries.)
  44. Insurance. Nascent but great potential, especially as driver to quantify cybersecurity risk impact.
  45. National security. Defense (force-protection, offensive) and Homeland Security (defensive measures, intelligence.)
  46. International. All of the other personas, but at an international level, with nuances for each country (or the EU as a whole.)
  47. Multilateral international intergovernmental organizations and institutions. Multilateral international institutions (UN, et al) having some interest in cybersecurity.
  48. Media. Reporting on vulnerabilities, exploits, threats, advances in defenses, general awareness, and covering incidents and vulnerabilities.
  49. Offensive threat actors. Hackers, et al. The people attacking connected digital systems, including individual hackers, criminal organizations, states, and transnational non-state actors, including terrorists and international criminal organizations.

Subsequent sections will detail subdivisions in each persona category.

Persona — User

This role is strictly as an end user, simply using applications, with no explicit cybersecurity role in an organization. If the user does indeed have a non-user cybersecurity role, see the Persona — Non-IT worker persona.

Users are not necessarily workers.

But all workers will be users.

  1. Consumers.
  2. Citizens. Taxpayers. Non-citizen residents. Consuming government services, frequently not by choice.
  3. Business workers. Role solely as end user, no other cybersecurity role. If they have a non-user cybersecurity role, see the Persona — Worker persona.
  4. Government workers. Role solely as end user, no other cybersecurity role. If they have a non-user cybersecurity role, see the Persona — Worker persona.
  5. Organization workers. Role solely as end user, no other cybersecurity role. If they have a non-user cybersecurity role, see the Persona — Worker persona.

Persona — Consumers

Consumers are users as well, but strictly outside of any organization.

  1. Mature adults.
  2. Teenagers.
  3. Children.
  4. Parents. Mom and dad are the IT staff and security experts for the home. Okay, okay… all too commonly the kids are much more tech savvy than their parents, but the parents are responsible for what happens in the household.
  5. College students.
  6. Grandma and Aunt Sally. Proverbial relatives who are clueless about security and more likely to take actions that are counter to their own best interests, without realizing it.
  7. Senior citizens. Still active.
  8. Elderly citizens. Not so active.
  9. Very elderly citizens. Not active. But their data may be active.
  10. Disabled — mild.
  11. Disabled — moderate.
  12. Disabled — severe.
  13. Mentally ill — mild.
  14. Mentally ill — moderate.
  15. Mentally ill — severe.
  16. Incarcerated.
  17. Tourists from abroad.

Persona — Citizen

The main reason for breaking citizens out as a distinct persona category is that there are use cases which are specific to citizens.

  1. Otherwise treated as any other consumer.
  2. Consumption of government services which are very different from most businesses and organizations. Government may maintain information or surveillance data on citizens.

There are some personas which have the same profile of citizens, but are not actual citizens:

  1. Non-citizen residents.
  2. Foreign tourists.
  3. Foreign business people.
  4. Temporary migrant workers.
  5. Illegal immigrants. May access government services even if not legally entitled.

Persona — Non-IT workers

Having some cybersecurity role distinct from merely being a user.

Also, this persona category is for non-management workers. For management, see the Persona — Non-IT Management persona.

  1. Business worker.
  2. Government worker.
  3. Organization worker.
  4. Contract worker.
  5. Consultant.
  6. Clerical worker.
  7. Technician.
  8. Sales.
  9. Customer service.
  10. Janitorial worker. May have access to sensitive areas and equipment.

Persona — Non-IT Management

May or may not have any direct or indirect cybersecurity role, with the possible exceptions of setting priorities, budgeting, and allocation of resources, which may have cybersecurity implications.

  1. Team or project leader.
  2. Supervisor.
  3. Manager.
  4. Middle level manager
  5. Senior manager
  6. Director.
  7. Junior executive. Must be aware both from non-executive and senior executive perspectives.

Beyond the level of a director or junior executive, see the Persona — Senior Executives persona.

Persona — Senior Executives

May or may not have any direct or indirect cybersecurity role, with the possible exceptions of setting priorities, budgeting, and allocation of resources, which may have cybersecurity implications.

  1. Junior executive. Must be aware both from non-executive and senior executive perspectives.
  2. Senior executive.
  3. Head of business unit.
  4. Head of division.
  5. CEO. President. Chief Operating Officer.
  6. Board of directors.

Persona — Executive Assistants

Executive assistants perform tasks on behalf of executives, and may be more tech-savvy than their bosses in many cases when it comes to using technology.

  1. Strictly clerical assistant.
  2. Operations assistant. Skilled using internal systems.
  3. Technical assistant. Technology specialist.
  4. General assistant.

Persona — Management for Cyber Services

Management in business units which offer cyber services to customers. Must be much more acutely aware of cybersecurity challenges than for business units which are not critically dependent on cyber services.

That said, it is growing increasingly rare for business units to not have some sort of involvement in cyber services, if for no other reasons than customer service.

  1. Team or project leader.
  2. Supervisor.
  3. Manager.
  4. Middle level manager
  5. Senior manager
  6. Director.
  7. Junior executive. Must be aware both from non-executive and senior executive perspectives.

Persona — Senior Executives for Cyber Services

Executive management for business units and enterprises which offer cyber services to customers. Must be much more acutely aware of cybersecurity challenges than for business units and enterprises which are not critically dependent on cyber services.

That said, it is growing increasingly rare for business units and enterprises to not have some sort of involvement in cyber services, if for no other reasons than customer service.

  1. Junior executive. Must be aware both from non-executive and senior executive perspectives.
  2. Senior executive.
  3. Head of business unit.
  4. Head of division.
  5. CEO. President. Chief Operating Officer.
  6. Board of directors.

Persona — IT Staff

IT staff develop, acquire, deploy, and manage computer systems and software and are responsible for cybersecurity of the business, government agency, or non-commercial organization, but are typically not directly responsible for development of applications — see the Persona — Application Software Developers persona for the latter.

  1. IT technical staff. Non-management. Technical responsibilities.
  2. IT management. No day to day technical responsibilities, but supervise, manage, or direct technical staff, directly or indirectly.

Persona — IT Technical Staff

  1. System architects.
  2. Security architects.
  3. Hardware IT technical staff.
  4. Software IT technical staff.
  5. Application software developers. May or may not be considered IT staff per se in some organizations. See the Persona — Application Software Developers persona.
  6. Contract workers.
  7. Consultants.

These persona categories have the same cybersecurity roles, but their use cases and access patterns may differ:

  1. No cybersecurity role. But should still be well aware of cybersecurity in the enterprise.
  2. Minor cybersecurity role.
  3. Major cybersecurity role, but have non-cybersecurity role(s) as well.
  4. Dedicated cybersecurity role.
  5. Architect — must integrate all aspects of cybersecurity with rest of hardware and software architecture.
  6. Insider threat. See Persona — Insider Threat.

This informal paper won’t drill down into specific technical roles, but details may be more apparent in use cases and access patterns.

For cybersecurity worker roles, see the NIST NICE Cybersecurity Workforce Framework.

Persona — Cybersecurity Technical Staff

The subset of IT technical staff who have a dedicated or major cybersecurity role.

For cybersecurity worker roles, see the NIST NICE Cybersecurity Workforce Framework.

Persona — Cybersecurity Professionals

Generally, anybody on the cybersecurity technical staff, including many but not necessarily all cybersecurity managers will be cybersecurity professionals.

For the field of cybersecurity they will have appropriate:

  1. Education.
  2. Training.
  3. Experience.
  4. Expertise.
  5. Competence.
  6. Certification, when appropriate.

Cybersecurity professionals will generally be on the IT staff, but may be elsewhere in the organization, such as on application development teams, in management, freelance consultants, etc.

For cybersecurity worker roles, see the NIST NICE Cybersecurity Workforce Framework.

Persona — IT Management

Although IT technical staff has primary responsibility for technical details, each level of IT management will need to have some degree of technical expertise, but the primary function of IT management in the cybersecurity realm is:

  1. Setting objectives, especially for cybersecurity.
  2. Set priorities.
  3. Budgeting.
  4. Allocation of resources.
  5. Monitoring and managing progress towards objectives, especially cybersecurity.

Levels of persona in IT Management

  1. Team or project leader.
  2. Supervisor.
  3. Manager.
  4. Middle level manager
  5. Senior manager
  6. Director or executive, head of IT in the enterprise.

The level of expertise of management in cybersecurity will be commensurate with the technical assignments of IT technical staff who are being managed. For a given manager, that may vary from none or minimal to extensive when managing technical staff who are dedicated to cybersecurity. But some minimum level of expertise and training in cybersecurity would be required at all levels.

Persona — Cybersecurity Management

The subset of IT management who have a dedicated or major cybersecurity role.

Includes the Chief Cybersecurity Officer for the organization.

Persona — Chief Cybersecurity Officer

The most senior cybersecurity professional in an organization. The most senior individual whose sole job and role is cybersecurity. Responsible for all aspects of cybersecurity for the organization. The buck stops here when it comes to cybersecurity. Title may vary.

Typically an executive, but may be a non-executive manager in some smaller organizations, or even a non-manager in the smallest organizations.

Persona — Physical Security Staff

Physical security of computing resources is essential. Lax or corrupted security guards and other physical security staff might improperly permit unauthorized physical access to computing and networking systems, bypassing some or all software cybersecurity defenses.

  1. Security guards.
  2. Security supervisors.
  3. Building management.
  4. Data center managers.
  5. All workers being aware of physical security and its importance.

Persona — Application Software Developers

Individuals and teams who develop application software which will have some degree of cybersecurity impact.

  1. No cybersecurity impact. Should still have basic awareness training. Rare that there would be absolutely no cybersecurity impact.
  2. Minimal cybersecurity impact.
  3. Moderate cybersecurity impact.
  4. Major cybersecurity impact.
  5. Dedicated to cybersecurity impact.

Application software may be developed by IT staff or separate group(s) focused on developing and maintaining application software. These personas will be similar for business, government, non-commercial organizations, and application software vendors selling application software to other organizations.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Application software designers.
  5. Application software architects.
  6. Application software developers.
  7. Technical assistants.
  8. Team leaders.
  9. Technical management.
  10. Middle management.
  11. Quality assurance (QA). Testing.
  12. Documentation.
  13. Marketing.
  14. Sales.
  15. Training.
  16. Training development.
  17. Customer service.
  18. Support.
  19. Directors.
  20. Executives.
  21. Board of directors.
  22. Advisers.

Persona — Insider Threat

Any workers (employee, contractor, consultant, etc.) with access to systems within the organization who seeks to attack or exploit the organization in some way.

Not all insider threat actors are created equal:

  1. Whistleblower. Doesn’t seek to harm the organization per se, but seeks to publicly disclose some illegal or dubious activity, in pursuit of a greater social good.
  2. Financial theft. Seeks to personally profit. Not necessarily to the extent that it would constitute a significant material impact on the organization.
  3. Personal vendetta. Has some grievance with the organization. Malevolent attempt to harm the organization. Disruption or destruction of operations or assets or reputation.
  4. Agent for external criminal enterprise. May or may not gain significant personal benefit, but seeks to facilitate actions of an external actor which seeks to exploit the financial value of operations and assets.
  5. Agent for an external social justice group. May not be motivated by money, but may intend to disrupt, destroy, or merely expose the organization and its activities.
  6. Hacktivist. Isolated individual or part of a small group with similar intentions or affinities to social justice groups.
  7. Agent for a foreign state. Either merely for industrial espionage or as a mole for disruption or destruction of operations or assets.
  8. Agent for a non-state terrorist organization. Same for for a foreign state.
  9. Testing. Legitimate and sincere but misguided effort by a worker to test a scenario that ends up causing a security vulnerability or actual harm.
  10. Red team. Effectively looks like an insider threat, but working for the best interests of the organization to discover cybersecurity vulnerabilities.

Persona — Consultants

Consultants are individuals or teams that work with groups in an organization, bringing some special expertise that is not easily obtained by that group otherwise, or not easily or quickly enough for the group to meet its objectives.

Consultants can be:

  1. Technical.
  2. Non-technical.
  3. Management. Such as organizational, culture, interaction with other groups, budgeting, planning.

Consultants can be:

  1. Internal. A group with special expertise dedicated to helping other groups within the organization.
  2. Outside. Consulting firms or individual, freelance consultants.

When working within an organization, consultants act to a significant degree asif they were workers and users within the organization and specific group they are working with, and possibly even management, but also as if they were outside vendors.

Persona — Cybersecurity Consultants

Consultants whose specialty is cybersecurity.

Persona — Industries

Particular industries may face distinct or common cybersecurity issues.

  1. Industry technical staff.
  2. Industry product managers.
  3. Industry executives.
  4. Industry associations.
  5. Industry cooperatives.

Persona — Computing Researchers

Even non-cybersecurity researchers need to be aware of cybersecurity aspects of their work.

  1. Academic.
  2. Commercial.
  3. Independent or freelance.
  4. Government.

Persona — Standard Setting Organizations

  1. Domestic standard setting organizations.
  2. Industry-specific standard setting organizations.
  3. International standard setting organizations.
  4. Technical staff of organizations participating on standard development.
  5. Cybersecurity staff of organizations participating on standard development.

Persona — Cybersecurity Researchers

Computing researchers whose main focus is cybersecurity.

  1. Academic.
  2. Commercial.
  3. Independent or freelance. Public, known, and respected.
  4. Quasi-professionals in the gray area between dubious hacking and legitimate research.
  5. Journalists.
  6. Activists.
  7. Government.

Persona — Cybersecurity Product Vendors

Firms which focus on development, distribution, and support of cybersecurity products.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Software architects.
  5. Software designers.
  6. Software developers.
  7. Team leaders.
  8. Technical management.
  9. Middle management.
  10. Quality assurance (QA). Testing.
  11. Documentation.
  12. Marketing.
  13. Sales.
  14. Training.
  15. Training development.
  16. Customer service.
  17. Support.
  18. Directors.
  19. Executives.
  20. Board of directors.
  21. Advisers.

Since the focus of the firm is cybersecurity, all levels of the firm should have a heightened sense of awareness, training, and expertise in cybersecurity.

Persona — Cybersecurity Service Providers

Firms which focus on delivery of services related to cybersecurity.

Can range from simple consulting to cloud-based services.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Software architects.
  5. Software designers.
  6. Software developers.
  7. Team leaders.
  8. Technical management.
  9. Middle management.
  10. Quality assurance (QA). Testing.
  11. Documentation.
  12. Marketing.
  13. Sales.
  14. Training.
  15. Training development.
  16. Customer service.
  17. Support.
  18. Directors.
  19. Executives.
  20. Board of directors.
  21. Advisers.

Since the focus of the firm is cybersecurity, all levels of the firm should have a heightened sense of awareness, training, and expertise in cybersecurity.

Persona — Computer System Vendors

Firms designing, producing, distributing, and supporting computer systems, including operating system software and some degree of pre-installed software packages, possibly including cybersecurity software features as well.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Hardware architects.
  5. Hardware engineers.
  6. Software architects.
  7. Software designers.
  8. Software developers.
  9. Team leaders.
  10. Technical management.
  11. Middle management.
  12. Quality assurance (QA). Testing.
  13. Documentation.
  14. Marketing.
  15. Sales.
  16. Training.
  17. Training development.
  18. Customer service.
  19. Support.
  20. Directors.
  21. Executives.
  22. Board of directors.
  23. Advisers.

Persona — Computing Service Providers

This would include cloud services and utility computing.

  1. Internet Service Providers.
  2. Cloud computing service providers.
  3. Cloud provider technical staff.
  4. Cloud provider technical managers.
  5. Cloud provider non-technical management.
  6. Cloud provider non-technical staff.
  7. Cloud provider executive management.

Since customers do not have direct access to the machines or basic software, they are critically dependent on the vendors staff to assure that cybersecurity is completely addressed.

  1. System architects.
  2. Security architects.
  3. Hardware staff.
  4. Operating system staff.
  5. Middleware staff.
  6. Cybersecurity staff.
  7. Team leaders.
  8. Technical management.
  9. Middle management.
  10. Quality assurance (QA). Testing.
  11. Documentation.
  12. Marketing.
  13. Sales.
  14. Training.
  15. Customer service.
  16. Support.
  17. Directors.
  18. Executives.
  19. Board of directors.
  20. Advisers.

See Access pattern — Cybersecurity Staff.

Persona — Software Tool Providers

Individuals involved with design, development, distribution, and support of software tools which have some degree of cybersecurity impact.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Software architects.
  5. Software designers.
  6. Software developers.
  7. Team leaders.
  8. Technical management.
  9. Middle management.
  10. Quality Assurance (QA). Testing.
  11. Documentation.
  12. Marketing.
  13. Sales.
  14. Training.
  15. Customer service.
  16. Support.
  17. Directors.
  18. Executives.
  19. Board of directors.
  20. Advisers.

Persona — Application Software Vendors

Besides all of their internal cybersecurity issues, firms which develop, distribute, and support application software also have a variety of obligations and liabilities to the organizations which acquire their application software.

  1. Product management.
  2. System architects.
  3. Security architects.
  4. Software architects.
  5. Software designers.
  6. Software developers.
  7. Team leaders.
  8. Technical management.
  9. Middle management.
  10. Quality Assurance (QA). Testing.
  11. Documentation.
  12. Marketing.
  13. Sales.
  14. Training.
  15. Customer service.
  16. Support.
  17. Directors.
  18. Executives.
  19. Board of directors.
  20. Advisers.

Persona — Vendors

A vendor is any other firm which an organization is dependent upon but does not have any significant control of, but might have a cybersecurity vulnerability.

Firms having a strong technology or cybersecurity focus have their own personas, reflecting that focus.

  1. Sales.
  2. Customer service contacts.
  3. Technical contacts.
  4. Technical staff.
  5. Non-technical staff.
  6. Cybersecurity staff.
  7. Vendors of the vendor.
  8. Technical management.
  9. Non-technical management.
  10. General management.
  11. Executive management.
  12. Board of directors.
  13. Advisers.

Persona — Customers and Clients

Customers and clients may have data, money, or other property at an enterprise which may be at risk due to risk of cybersecurity incidents.

  1. Consumers.
  2. Small businesses.
  3. Medium businesses.
  4. Large businesses.
  5. Non-commercial organizations.
  6. Government agencies.
  7. Foreign consumers.
  8. Foreign businesses.
  9. Foreign governments.

Persona — Shareholders and Investors

Individuals or organizations which have an ownership interest or other financial interest in the value of the firm which might be compromised due to a cybersecurity incident.

  1. Individual shareholders.
  2. Employees. Owning shares, such as in retirement accounts or stock options or grants.
  3. Institutional shareholders.
  4. Pension funds.
  5. Venture capital funds.
  6. Private equity funds.

Persona — Venture Capital Funds

  1. VC in cybersecurity firms.
  2. VC in non-cybersecurity firms.
  3. VC in cyber service firms which have a high cyber risk profile.

Persona — Think Tanks

Public policy organizations which have a policy interest in cybersecurity or even technology in general.

  1. Policy researchers — non-technical.
  2. Policy researchers — technical.
  3. Policy researchers — cybersecurity — non-technical.
  4. Policy researchers — cybersecurity — technical.
  5. Research assistants — non-technical.
  6. Research assistants — technical.
  7. Research assistants — cybersecurity — non-technical.
  8. Research assistants — cybersecurity — technical.

Persona — Educators and Trainers

Academic and commercial educators and trainers related to cybersecurity. Includes workforce development.

  1. Academic — non-technical — general awareness.
  2. Academic — technical — greater awareness and skills.
  3. Academic — cybersecurity — main focus.
  4. Commercial training — non-technical — general awareness.
  5. Commercial training — technical — greater awareness and skills.
  6. Commercial training — cybersecurity — main focus.
  7. Inhouse training — non-technical — general awareness.
  8. Inhouse training — technical — greater awareness and skills.
  9. Inhouse training — cybersecurity — main focus.
  10. Management of cybersecurity workforce development programs — commercial efforts.
  11. Management of cybersecurity workforce development programs — government efforts.
  12. Management of cybersecurity workforce development programs — academic efforts.

Persona — Students

  1. Students — non-technical — general awareness.
  2. Students — technical — greater awareness and skills.
  3. Students — cybersecurity — main focus.

Education level:

  1. Elementary school. Very basic.
  2. Junior high school, middle school.
  3. High school.
  4. Community college.
  5. Baccalaureate degree.
  6. Graduate degree.
  7. Doctorate.
  8. Post-doctorate.

Persona — Lawyers

Lawyers involved with any aspect of cybersecurity in an organization.

  1. Lawyers helping clients understand the law.
  2. Lawyers reviewing client organization and processes regarding the law.
  3. Lawyers defending client against actions related to cybersecurity.
  4. Lawyers initiating actions on behalf of clients related to cybersecurity.
  5. Lawyers interacting with regulators on enforcement matters.
  6. Lawyers commenting on proposed cybersecurity regulations.
  7. Lawyers for business units which directly use cyber services.
  8. Lawyers for business units which use outside services which may rely on cyber services.
  9. Lawyers for business units which use outside cybersecurity services.
  10. Lawyers for business units which develop, distribute, or support cyber services. Liability issues.
  11. Lawyers — Patents — Registering.
  12. Lawyers — Patents — Licensing.
  13. Lawyers — Patents — Litigation — Pursuing.
  14. Lawyers — Patents — Litigation — Defense.

Persona — Regulators

Government agencies responsible for promulgating and enforcing regulations related to cybersecurity.

May be federal, state, or local. Or international.

  1. Lawyers writing regulations.
  2. Lawyers reviewing proposed regulations.
  3. Lawyers enforcing regulations.
  4. Technical staff enforcing regulations.
  5. Clerical staff enforcing regulations.
  6. Management.
  7. Senior management.
  8. Executive leadership for agency.
  9. Public outreach.
  10. Communication and outreach.
  11. Web services related to implementing regulations.
  12. Web services related to enforcing regulations.

Persona — Government Leaders

Government leaders who set priorities and are involved in budgeting and allocation of resources related to cybersecurity.

  1. National leaders. Executive branch.
  2. State or regional leaders.
  3. Local leaders.

Persona — Government Agencies

Government agencies generally have the same interests and needs as users, workers, management, executives, and IT staff at any business, enterprise, or non-commercial organization — see those persona categories, with the exception of agencies involved in national security — see Persona — National Security.

But there may be special needs when government is involved, in contrast to the private sector:

  1. National government officials.
  2. State government officials.
  3. Municipal and local government officials.
  4. Federal government IT staff.
  5. Federal government IT cybersecurity staff.
  6. Federal government non-IT staff.
  7. State government IT staff.
  8. State government IT cybersecurity staff.
  9. State government non-IT staff.
  10. Municipal and local IT staff.
  11. Municipal and local IT cybersecurity staff.
  12. Municipal and local non-IT staff.
  13. Federal Reserve System. Including payment system.

Persona — Legislators

Legislator are responsible for creating and updating cyber-related law and regulation (what’s illegal, penalties, granting immunities to facilitate protection) and budgeting (protection of government services, regulation, sponsoring research.)

  1. Elected legislators with a special focus on cybersecurity — national (Congress.)
  2. Elected legislators without any special focus on cybersecurity — national (Congress.)
  3. Legislative staff with a special focus on cybersecurity — national.
  4. Legislative staff without any special focus on cybersecurity — national.
  5. Legislative policy staff with a special focus on cybersecurity — national.
  6. Legislative policy staff without any special focus on cybersecurity — national.
  7. Legislative technical staff with a special focus on cybersecurity — national.
  8. Legislative technical staff without any special focus on cybersecurity — national.
  9. Committee staff with a special focus on cybersecurity — national.
  10. Committee staff without any special focus on cybersecurity — national.
  11. Committee technical staff with a special focus on cybersecurity — national.
  12. Committee technical staff without any special focus on cybersecurity — national.
  13. Research staff with a special focus on cybersecurity — national.
  14. Research staff without any special focus on cybersecurity — national.
  15. Research technical staff with a special focus on cybersecurity — national.
  16. Research technical staff without any special focus on cybersecurity — national.
  17. Elected legislators with a special focus on cybersecurity — state.
  18. Elected legislators without any special focus on cybersecurity — state.
  19. Legislative staff with a special focus on cybersecurity — state.
  20. Legislative staff without any special focus on cybersecurity — state.
  21. Legislative policy staff with a special focus on cybersecurity — state.
  22. Legislative policy staff without any special focus on cybersecurity — state.
  23. Legislative technical staff with a special focus on cybersecurity — state.
  24. Legislative technical staff without any special focus on cybersecurity — state.
  25. Committee staff with a special focus on cybersecurity — state.
  26. Committee staff without any special focus on cybersecurity — state.
  27. Committee technical staff with a special focus on cybersecurity — state.
  28. Committee technical staff without any special focus on cybersecurity — state.
  29. Elected officials and staff at the local or municipal level.

Persona — Courts

  1. Judges.
  2. Clerks.
  3. Supreme court justices.
  4. Supreme court clerks.
  5. Criminal courts.
  6. Civil courts — business and personal lawsuits.
  7. Administrative courts.
  8. Federal courts.
  9. Federal appeals courts
  10. State courts.
  11. International courts.

Persona — Law Enforcement

  1. Local law enforcement.
  2. State.
  3. FBI.
  4. Homeland Security — education, monitoring, guidance, assistance.
  5. Cooperation between the levels.
  6. International. INTERPOL. Cooperation with law enforcement in other countries.

Persona — Insurance

Cybersecurity insurance is nascent but has great potential, especially as a key driver to quantify cybersecurity risk impact.

  1. Staff creating insurance programs.
  2. Staff assessing risks.
  3. Staff writing insurance policies.
  4. Staff servicing claims.
  5. Management.
  6. Executives. Deciding what lines of business to enter or exit.

In particular, insurance company executives must adequately understand the risks they are underwriting.

Persona — National Security

All government agencies involved with national security.

  1. Defense — force-protection, cyberwarfare.
  2. Military leaders, senior officers.
  3. Military officers.
  4. Military enlisted men.
  5. Military bases and facilities.
  6. Cyberwarriors.
  7. Intelligence analysts.
  8. Homeland Security — defensive measures, intelligence.
  9. Homeland security cybersecurity professionals.
  10. Homeland security — managers.
  11. Homeland security — principals.
  12. Defense contractors.
  13. Counterterrorism activities.
  14. Espionage.
  15. Counterespionage.
  16. Threat analysts.
  17. Nuclear weapons complex. Including National Nuclear Security Administration.
  18. National Laboratories (DOE.) Involved in cybersecurity research, and its own needs for cybersecurity.

Persona — International

All of the other personas, but at an international level, with nuances for each country (or the EU as a whole.)

Generally and more broadly:

  1. Foreign consumers.
  2. Domestic consumers accessing foreign cyber services.
  3. Foreign consumers with data located domestically.
  4. Domestic consumers accessing data stored in another country
  5. Foreign businesses.
  6. Foreign businesses accessing domestic cyber services.
  7. Foreign businesses accessing data located domestically.
  8. Domestic businesses accessing data stored in another country.
  9. Domestic businesses operating in other countries.
  10. Domestic businesses accessing foreign cyber services.
  11. Foreign governments.
  12. Foreign regulators.
  13. Multilateral international intergovernmental organizations and institutions.

Persona — Multilateral International Intergovernmental Organizations and Institutions

Multilateral international institutions (UN, et al) having some interest in cybersecurity.

  1. UN and its agencies.
  2. Multinational organizations — transnational issues.
  3. Countries party to treaties.
  4. International institutions facilitating financial transactions.
  5. International institutions related to law enforcement and courts.
  6. Other international institutions.
  7. Other intergovernmental organizations.

Multinational personas, use cases, and access patterns will generally be the same as at the national, subnational, and organizational level, but there may be nuances.

Persona — Media

Reporting on vulnerabilities, exploits, threats, advances in defenses, general awareness, and covering incidents.

  1. Journalists — general reporting on vulnerabilities, exploits, threats, advances in defenses, general awareness, and covering incidents.
  2. Journalists — in-depth investigations.
  3. Journalists — reporting policy discussions and legislation.
  4. Journalists — communicating cybersecurity issues to technical professionals.
  5. Journalists — communicating cybersecurity issues to non-technical professionals.
  6. Journalists — communicating cybersecurity issues to consumers.
  7. Journalists — communicating cybersecurity issues to managers and executives.
  8. Journalists — communicating cybersecurity issues to government leaders, officials, legislators, and staff.

Persona — Offensive Threat Actors

These are the people responsible for making cybersecurity necessary.

  1. Amateur hackers. Thrill motive.
  2. Security researchers. Discovery of vulnerabilities. Professional motive — in theory.
  3. Criminal hackers. Cybercriminals. Profit motive.
  4. International criminal hackers. Larger scale.
  5. Commercial disruption. Interfere with the competition.
  6. Industrial espionage. Information on the competition.
  7. State-sponsored industrial espionage. Industrial espionage on a competitor country or adversary country.
  8. Sociopolitical hackers. Disrupt commercial or governmental activities based on ideology and sociopolitical motives. May be individual hacktivists, small informal groups, or larger associations with many individuals providing moral support for a smaller number of actual hackers.
  9. State hackers. Cyber espionage. After national security information of a competitor country or an adversary country.
  10. Cyberwarfare. Interstate conflict. May be narrowly targeted or for mass disruption. Seek to disrupt national security apparatus.
  11. State-sponsored hackers. States may outsource state hacking.
  12. Non-state state hackers. Terrorist groups. International criminal gangs.
  13. Red teams. Internally-sanctioned efforts seeking to challenge or compromise cyber operations in the name of discovering vulnerabilities needing to be rectified before true offensive threat actors attack.
  14. Whistleblowers. Doesn’t seek to harm the organization per se, but seeks to publicly disclose some illegal or dubious activity, in pursuit of a greater social good.
  15. Insider threats. See Persona — Insider Threat.
  16. Botnets. User devices hijacked on a large scale to participate in cyberattacks.

Use Cases

A use case is a type of larger context for the objectives or purpose for which a person (persona) is engaging in activities and tasks (access patterns.)

A use case may simply be an application or a solution or an audience for the use of computing technology.

The point of discriminating distinct use cases is to highlight that there are technical or practical differences between the use cases.

Different use cases may have different personas for which they have special significance.

There may be any number of personas to which a given use case is significant.

Any number of use cases may have significance to a given persona.

Again, a use case is a context. The specific tasks or activities applicable to a particular use case are categorized under the access patterns for that use case, or under the access patterns for particular personas that have an interest in that use case.

Use case categories

There are many use cases relevant to cybersecurity. They can be grouped under a smaller number of categories of use cases.

  1. Global cybersecurity. Relevant to all systems, all devices, and all users, everywhere.
  2. Human nature. Global factors across all use cases which are inherent in human nature.
  3. Identity. How a computer system or application knows who you are.
  4. Real identity. How social, political, and legal systems know who you are in the real world.
  5. Anonymous. Many applications do not need to know your real identity.
  6. Privacy.
  7. Civil liberties.
  8. Accounts.
  9. User-created data and content.
  10. Transaction data.
  11. Email.
  12. Web browsing.
  13. Social media. Each platform has its own issues.
  14. E-commerce.
  15. Instant messaging.
  16. Encrypted messaging.
  17. VPN — Virtual Private Network.
  18. Voice calls — VOIP.
  19. Video calls.
  20. Government agencies dependent on cyber services.
  21. E-government. Government agencies deploying cyber services to offer services to the public and vendors.
  22. Online office documents.
  23. Document repositories.
  24. Online business applications.
  25. Online HR and personnel data.
  26. Online financial records.
  27. Other online applications and their data.
  28. Health and medical records.
  29. Medical systems.
  30. Medical devices.
  31. Election systems.
  32. Infrastructure.
  33. Network design.
  34. Data centers.
  35. Servers.
  36. Email servers.
  37. Web servers.
  38. Application servers.
  39. Data collection.
  40. Academic institutions.
  41. Semi-public online services.
  42. Consumer semi-public online services.
  43. Network services. Ports, web services.
  44. Remote access. Telnet, remote desktop access.
  45. Code access. Accessing code as data (theft of IP), modification, destruction.
  46. Personally-identifiable information (PII).
  47. Sharing of user data — authorized.
  48. Sharing of user data — implicitly authorized.
  49. Sharing of user data — unauthorized.
  50. Marketing of user data — authorized.
  51. Marketing of user data — implicitly authorized.
  52. Marketing of user data — unauthorized.
  53. Operational Technology (OT).
  54. Vehicles. Including autonomous (driverless), remote diagnostic access, and internal access.
  55. Internet of Things (IoT) devices.
  56. Non-Smart cell phones. Text messages stored in the cloud are vulnerable.
  57. Smart phones.
  58. Bluetooth devices.
  59. Web cameras. On user’s computer.
  60. Remote web cameras.
  61. Video surveillance systems.
  62. Live streaming video.
  63. Unauthorized connected devices.
  64. USB drives.
  65. Wi-Fi.
  66. Routers.
  67. Firewalls.
  68. Network connections.
  69. Internet Service Providers (ISP).
  70. Supply chain vulnerabilities.
  71. Federal Reserve payment system.
  72. Banks.
  73. Credit card companies.
  74. Bank accounts.
  75. Credit cards.
  76. Money laundering.
  77. Credit bureaus.
  78. Credit history. Credit history damage as a result of identity theft.
  79. Databases.
  80. Distributed databases.
  81. Blockchain and distributed ledgers.
  82. Cryptocurrencies. Currency itself, wallets, exchanges, attacks on value of currency.
  83. Search engines.
  84. Distributed search engines.
  85. Cyber defense hardware.
  86. Cyber defense software.
  87. Cyber defense services.
  88. Cyber defense teams.
  89. Cyber warfare.
  90. Insurance.
  91. Targeting an individual.
  92. Targeting a business of organization.
  93. Targeting business and capitalism.
  94. Targeting government.
  95. Targeting political interests.
  96. Physical asset security.
  97. Undetected vulnerabilities.
  98. Undetected incidents.
  99. Legacy systems.
  100. Future systems.

Subsequent sections will detail specific use case categories and any subdivisions, if needed.

Use case — Global Cybersecurity

Global cybersecurity covers all systems, all devices, and all users, everywhere.

This includes:

  1. Global Internet governance.
  2. International standards.
  3. Technology in general. Knows no national boundaries.
  4. Software in general. Knows no national boundaries.
  5. Cybersecurity in general. Knows no national boundaries.
  6. Human nature in general. Knows no national boundaries.
  7. Users in general. Much of user needs, interests, and behavior transcends national boundaries.

Use case — Human Nature

Human nature can range from good to bad, from great to terrible. Especially when it comes to cybersecurity.

Even the best systems, developed with the best technology will crumble under cyberattack if they do not take the vagaries of human nature into account as they are conceived, specified, designed, developed, acquired, deployed, configured, managed, and used.

As the old saying goes, the best laid plans of mice and men often go awry.

Or to paraphrase Murphy, if something can go wrong, it will.

Technologies, designs, code, processes, methods, and best practices all need to take human nature into account. Even then, there are no strong assurances.

As buggy or error-prone as systems may be, cybersecurity itself can be just as buggy or error prone.

Ongoing diligence and vigilance are essential.

Use case — Identity

Computer systems and applications generally tailor their operations to particular uses, which requires that the software identify the user.

There are three general categories of identity:

  1. Contrived. User makes up an identity. The software only needs to distinguish between users, not generally needing to know their true identity in the real world.
  2. Real identity. A real person, real business, real governmental agency, or non-commercial organization.
  3. Anonymous. May be contrived or completely blank. The user seeks to hide or shield their identity, either for benevolent or malevolent purposes.

There may or may not be a direct relationship between user identity and accounts. Generally, a software system will associate a user identity with an account, but the two concepts are technically distinct even though related.

Use case — Contrived Identity

The intention with a contrived identity is that the software only needs some way to distinguish between different users. Their real identity is generally not needed.

The user makes up an ID, user name, handle, or other identifier which may be real or may be fictitious. It may also be an email address, which itself may be (or usually is) contrived. The software doesn’t doesn’t care whether the user is real or contrived, just distinct from other users.

Identity may also be a hybrid, with a contrived identity plus elements of a real identity, such as billing and shipping names and addresses or bank account information.

There are several general use cases of contrived identity:

  1. Intended as a surrogate for real identity. Used like a nickname. Primary use case.
  2. Joke, parody, satire.
  3. Testing.
  4. Research. Experimentation.
  5. Fraud.
  6. Disinformation.
  7. Fake. Intended to deceive, for some other purpose than listed above.

Use case — Real Identity

The intention here is that the computer system or application needs to know that it is connecting with a real person or real organizational entity.

See Access pattern — Real Identity for details on confirming real identity.

Use case — Anonymous

The intention here is that the user does not want the software or anybody else in the world to know their real identity.

They may have benign, benevolent reasons for shielding their identity, or they may have malevolent intentions. Generally, the computer cannot make a clear determination. So, the presumption is that the user’s intentions are strictly innocent.

The software or service provider may have some indirect or partial way of identifying the real person, such as their IP address.

Law enforcement and courts may be able to compel a service provider to assist in determining the real identify of a user who has sought to remain anonymous.

Use case — Accounts

Technically, accounts and identities are two distinct concepts, although in practice there may be a clear, one-to-one relationship, at least in some or even many cases.

Technically, a user could use the same identity for different accounts on different software systems, although that is discouraged to minimize the risk of theft of account information on any given system.

The user may or may not be aware of an internally assigned account name, number, or other identifier, since generally the user only needs to be aware of their identity credentials (user name or ID and password) to access any particular account.

In the case of a bank, credit card, or other financial institution the account number will be very important and prominently displayed both online and on statements, but the user will still know and use their account primarily from their user identity.

Use case — Transaction Data

  1. Banking activity.
  2. Credit card transactions.
  3. E-commerce transactions.
  4. Customer interaction history.
  5. Enterprise transactions.

Use case — Web Browsing

  1. Cookies.
  2. History.
  3. Encryption.
  4. Incognito mode.
  5. HTML script execution.
  6. Download cache.
  7. Web page cache.

Use case — Email

  1. Email messaging.
  2. Email attachments — media.
  3. Email attachments — PDF and slide presentations.
  4. Email attachments — office documents (word processing, spreadsheet, presentations).
  5. Email attachments — ZIP files — expected (rarely)
  6. Email attachments — ZIP files — unexpected, malevolent attack
  7. Email attachments — executables — expected (very rarely)
  8. Email attachments — executables — unexpected, malevolent attack

Use case — Email Server

An email server is responsible for managing email accounts and sending, receiving, and storing email messages.

Use case — Encrypted Messaging

Some messaging platforms, such as Telegram, permit heavily encrypted operation so that neither a random hacker, nor law enforcement armed with a legitimate warrant, nor a determined government can view the underlying messages.

In theory.

Use case — VPN — Virtual Private Network

A Virtual Private Network (VPN) is application software running on an endpoint, such as a personal computer, tablet, or smartphone, which allows a user to connect from or over a public network into a private network, an internal network of an organization, as if they were directly connected to that non-public network. All of the user’s command and data transmission traffic over the VPN is fully and securely encrypted so that no devices on the public network can eavesdrop.

In theory.

Use case — Online Office Documents

Highlighting that this is a key area where users create and manage a lot of data and can easily get careless about access control for sharing data, and are vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — Document Repositories

Highlighting that this is a key area where users create and manage a lot of data and can easily get careless about access control for sharing data, and are vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — Online Business Applications

Highlighting that this is a key area where users enter and update a lot of critical business data, and are vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — Online HR and Personnel Data

Highlighting that this is a key area where very sensitive personal data is entered, updated, and stored in bulk, and organizations and individuals are vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — Online Financial Records

Highlighting that this is a key area where businesses and individuals alike have valuable and sensitive financial data which is very vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — Other Online Applications and Data

Highlighting that this is a key area where businesses and individuals alike have valuable and sensitive data which is very vulnerable if hackers gain access to the applications using compromised identity credentials or to the underlying databases and data files.

Use case — User-Initiated Sharing of Data

Users themselves can consciously decide to share data online, but the underlying systems manage the access controls for that sharing.

The cybersecurity challenge is twofold:

  1. Assuring that user control over sharing is not compromised in the underlying system. For example, using elevated privilege to bypass user control.
  2. Assuring that users are properly trained about their own responsibilities to share responsibly and to be aware of the consequences of their own decisions, especially when the consequences impact the organization they work with and any other individuals who are impacted by the data that they might choose to share.

Use case — Sharing of User Data

  1. Sharing of user data — authorized, explicitly.
  2. Sharing of user data — authorized, implicitly, not realized by the user.
  3. Sharing of user data — unauthorized.

Use case — Marketing of User Data

  1. Marketing of user data — authorized, explicitly.
  2. Marketing of user data — authorized, implicitly, not realized by the user.
  3. Marketing of user data — unauthorized.

Use case — Non-Smart Cell Phones

  1. Cellular voice calls. No direct cybersecurity aspect. Or, is StingRay considered cybersecurity?
  2. Cellular text message. No direct cybersecurity aspect, but text messages stored in cloud are vulnerable. Again, what about StingRay?

Use case — Smart Phones

  1. Generally all use cases for computers as well.
  2. Company phones.
  3. Personal phones.
  4. Wi-Fi connection.
  5. Cellular voice calls. No direct cybersecurity aspect, except Stingray.
  6. Cellular text message. No direct cybersecurity aspect, but text messages stored in cloud are vulnerable. And Stingray.
  7. Carrier monitoring of user activity. Both in phone and in network.
  8. Carrier databases of user activity and call records.
  9. Vendor-added software which monitors and captures user data for carrier.
  10. User-added apps which monitor and capture user data for the app provider.

Use case — Operational Technology (OT)

See:

  • Use case — Vehicles
  • Use case — Internet of Things (IoT) Devices
  • Use case — Infrastructure

Use case — Vehicles

  1. Autonomous (driverless) vehicles.
  2. Remote diagnostic access, both autonomous and human driver.
  3. Internal access by a passenger.

Use case — Internet of Things (IoT) Devices

  1. Internet of Things (IoT) devices — authorized access.
  2. Internet of Things (IoT) devices — unauthorized access.
  3. Internet of Things (IoT) devices — authorized access but with stolen credentials.

Use case — Infrastructure

Whether a given infrastructure system is to be deemed critical is beyond the scope of this paper.

  1. Industrial process control systems in general.
  2. SCADA systems.
  3. Physical security systems. Security cameras, card readers, biometric scanners, door control, area access control, access permission records, access logging.
  4. Manufacturing plants.
  5. Chemical plants.
  6. Power plants.
  7. Power grids.
  8. Power substations.
  9. Fuel production plants.
  10. Fuel storage facilities.
  11. Fuel distribution facilities.
  12. Communication facilities.
  13. Communication grids.
  14. Communication networks.
  15. Data centers.
  16. Food production. Farms and plants.
  17. Food storage facilities.
  18. Food distribution facilities.
  19. Food safety. Cleaning, testing, temperature control for storage and transport.
  20. Transportation systems.
  21. Airports.
  22. Ports.
  23. Railroads.
  24. Highways.
  25. Transportation terminals and stations.
  26. Pharmaceutical facilities. Design, production, testing, storage, security, distribution, trials, data, databases.
  27. Warehouses.
  28. Office parks.

Use case — Network Design

The design of a network for an organization is critical to its security.

Components include:

  1. Internal. All connected systems within the organization.
  2. Servers. And racks and blades.
  3. Routers.
  4. Firewalls.
  5. Endpoints. Users. Personal computers.
  6. Proprietary data centers.
  7. Multiple facilities, connected.
  8. Workers and computers and devices outside of facilities connecting to internal network.
  9. Cloud. Use of cloud service providers.
  10. Use of external web services.
  11. Internal services.
  12. Proprietary services made publicly available.
  13. Software to manage network.
  14. Cybersecurity software to monitor and defend the network and all endpoints connected to the network.

Use case — Data Centers

  1. Network design. See Use case — Network Design.
  2. Facility design.
  3. Connection to global communication networks.
  4. Significant cybersecurity challenge.

See Access pattern — Data Centers.

Use case — Servers

Types of servers:

  1. Email servers.
  2. Web servers.
  3. Application servers.
  4. Other.

Use case — Web Servers

These are the servers which retrieve web pages using the HTTP protocol.

Use case — Application Servers

These are the servers which execute application software.

Use case — Data Collection

  1. Consumer data.
  2. Business data.
  3. Government data.
  4. Authorized collection.
  5. Implicitly authorized collection. Terms of service.
  6. Expected collection.
  7. Unexpected collection.
  8. Collection of publicly available data. Scraping.
  9. Surreptitious collection.
  10. Illegal collection.

Use case — Medical systems

  1. Operations of a health facility.
  2. Patient records.
  3. Control for medical devices within health facility.

Use case — Election Systems

  1. Voter registration.
  2. Voting machines.
  3. Voting results.

Use case — Semi-public Online Services

In contrast to open cyber services which will be available to all members of the general public, semi-public online services will be available only to elite users, members of designated groups, business users, and government agencies who can pass required explicit vetting approval with strict requirements, so that any random user can’t instantly create an account or identity.

These online services may involve:

  1. High-value finance.
  2. Highly-qualified users.
  3. Carefully-scoped contracts.
  4. Government contracts.
  5. Defense contracts.
  6. Intelligence contracts.
  7. Confidential data.
  8. Classified data.

As such, their cybersecurity needs may be dramatically greater than open cyber services.

Consumers may also utilize semi-public online services, but that is considered a distinct use case here.

Use case — Consumer Semi-Public Online Services

Semi-public online services available to consumers.

Some examples:

  1. Banks.
  2. Credit cards.
  3. Brokerage and other investment accounts.
  4. Utility accounts.
  5. Any business or non-commercial organization with real world accounts for real world services, which provides services online as well.

The point is that unlike a fully public online service where anyone can create an account anywhere, at any time, and for any reason, semi-public accounts tend to have a direct association with an account at a firm that is not solely an online cyber service.

Most aspects of the consumer semi-public online services use case and its access patterns will be similar if not identical to the main semi-public online services use case.

Use case — Targeting an Individual

The offensive threat actor harbors intense animosity towards a particular individual.

The goal is to harass, embarrass, bully, disrupt, harm, cripple, or even kill the target individual. Or even induce them to commit suicide.

There may be a financial motive as well, but generally the primary motive is some irrational animosity.

Access patterns will be the same as any individual, user, or consumer.

Use case — Targeting an Organization

The offensive threat actor harbors intense animosity towards a particular business or organization.

The goal is to harass, embarrass, bully, disrupt, harm, cripple, or even destroy the target business or organization.

There may be a financial motive as well, but generally the primary motive is some irrational animosity.

Access patterns will be the same as any business or organization.

Use case — Targeting Business and Capitalism

The offensive threat actor has no direct interest or even a direct financial interest in a target business, but is ethically and ideologically opposed to big business, the profit motive, and capitalism overall.

The goal is to harass, embarrass, disrupt, harm, cripple, or even destroy the target business.

Or any organization which operates in fairly direct support of such businesses, such as trade associations.

Access patterns will be the same as any business or organization.

Use case — Targeting Government

The offensive threat actor is opposed to the target government or the regime currently in control of the government, or a particular policy or policies.

If the target is a particular policy or policies, the goal is to force the government to change its policies.

If the target is not policy per se, the goal is to harass, embarrass, disrupt, harm, cripple, or even destroy the target government.

Or any organization, business, or other government which operates in fairly direct support of the target government.

Access patterns will be the same as any business or organization.

Use case — Targeting Political Interests

The offensive threat actor is opposed to the target political party, faction, or individual politician, or their policies in general, or a particular policy or policies.

If the target is a particular policy or policies, the goal is to force the political entity to change its policies.

If the target is not policy per se, but a political party, faction, or individual politician, the goal is to harass, embarrass, disrupt, harm, cripple, or even destroy the target political entity.

Or any organization, business, or governmental entity which operates in fairly direct support of the target political entity.

Access patterns will be the same as any business organization, or individual.

Use case — Physical Asset Security

All of the best cybersecurity software, processes, and best practices in the world will be for naught if malevolent actors can gain unauthorized physical access to systems, bypassing some or all software cybersecurity defenses.

Use case — Undetected Vulnerabilities

Systems, software, and services may have vulnerabilities which have not yet been detected.

It is a race to see who will discover the vulnerability first, the defender or the offensive threat actor.

The only real answer here is to escalate the level of research and auditing to evaluate systems, software, and services for vulnerabilities, and then to devise and deploy corrections or defenses.

Use case — Undetected Incidents

Not all cybersecurity attacks, events, or incidents are detected.

Sometimes systems can go for hours, days, weeks, months, or even years, before somebody finally assesses that an attack occurred.

In fact, some attacks are never detected. And maybe due to the nature of the vulnerability might never be detected.

The only real answer here is to escalate the level of research and auditing into detection of cyber events.

Use case — Legacy Systems

Systems and software that were designed, implemented, and deployed prior to development of modern cybersecurity technology, processes, methods, and best practices are a special concern.

In some cases such systems and software can feasibly be upgraded to modern cybersecurity, albeit at some potentially significant cost. But in many cases budgeting, logistical concerns, practical concerns, and organizational inertia preclude or slow such upgrades.

Some legacy systems and software are not connected in any way to the Internet, so are at no direct risk.

But, some unconnected legacy systems might be upgraded to permit at least limited connectivity, in which case they would be exposed to cybersecurity risks.

Also, a malevolent actor might surreptitiously modify an unconnected legacy system to connect it to the Internet in such a way to exploit its potential cybersecurity vulnerabilities.

Use case — Future Systems

New systems and software should of course be designed, developed, and deployed according to the latest and best cybersecurity technology and best practices.

That’s the theory.

Unfortunately organizations with limited resources or management or technical staff lacking proper cybersecurity training or simply suffering from organizational inertia might fail to adhere to preferred cybersecurity best practices.

Systems and software which might be expected to be developed and deployed a year or more in the future might adopt more leading or bleeding edge cybersecurity technology, processes, methods and better practices than new systems which must be deployed in the present day.

Use of bleeding edge technology and practices might involve beta or even alpha test versions of products, tools, and services which are not yet ready for deployment. This approach carries risk, but might more than compensate for that risk with greater benefits than products, tools, services, and practices which are currently available.

Access Patterns

An access pattern is a type of operation, function, activity, or task that a person (persona) is performing when using connected digital systems, or in support of using connected digital systems. Sending or receiving an email message, posting on social media, or buying something online are examples of access patterns.

There can be significant overlap for access patterns between personas and use cases, but there are many distinctive access patterns peculiar to specific personas or use cases.

Since access patterns may differ between use cases or even for personas within use cases, there are a variety of categories of access patterns.

Access pattern categories

  1. NIST Cybersecurity Framework. Core functions.
  2. Human nature.
  3. Identity.
  4. Accounts.
  5. Applications, data, and users.
  6. User-created data and content.
  7. User-initiated sharing of data.
  8. Personally-Identifiable Information (PII).
  9. Collection of user data.
  10. Sharing of user data.
  11. Marketing of user data.
  12. Financial transaction data.
  13. Web browsing.
  14. Email.
  15. Email servers.
  16. Social media.
  17. Encrypted messaging.
  18. VPN — Virtual Private Network.
  19. Cyber services. Web services. Any networked service using Internet protocols.
  20. Network design.
  21. Data access.
  22. Remote access.
  23. IT staff.
  24. Cybersecurity staff.
  25. Management.
  26. Executives.
  27. Training.
  28. Workers. Non-issue for consumers.
  29. Bluetooth devices.
  30. Web cameras.
  31. Remote web cameras.
  32. Video surveillance systems.
  33. USB drives.
  34. Wi-Fi.
  35. Routers.
  36. Firewalls.
  37. Network connections.
  38. Internet Service Providers (ISP.)
  39. Supply chain vulnerabilities.
  40. Law enforcement.
  41. Cyber warfare.
  42. Insurance.
  43. Vulnerabilities and threats
  44. Offensive threat actors.

Access pattern — NIST Cybersecurity Framework

See the NIST Cybersecurity Framework for much more detail, but for the record and for the convenience of readers, here are the major categories of access patterns in the NIST framework,which they refer to as core functions:

  1. Identify — Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.
  2. Protect — Develop and implement appropriate safeguards to ensure delivery of critical services.
  3. Detect — Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
  4. Respond — Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
  5. Recover — Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Cybersecurity events and incidents

The distinction between a cybersecurity event and a cybersecurity incident is somewhat nuanced, so that the two terms will frequently be used synonymously, but they are distinct, even though closely related.

The glossary (Appendix B) of the NIST Cybersecurity Framework tells us:

  • Cybersecurity Event — A cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation).
  • Cybersecurity Incident — A cybersecurity event that has been determined to have an impact on the organization prompting the need for response and recovery.

Or in plainer language:

  • An event is simply something that happened. It may or may not be a big deal that requires a response.
  • An incident is an event which is considered problematic and requires a response.

For example, a failed attempt to log in to a known user ID but with an invalid password would be an event, but won’t require a response from the cybersecurity team, so it wouldn’t be an incident. But if a pattern of such events might be treated as an incident requiring a response.

Access pattern — Human Nature

  1. If a user can make a mistake, they will.
  2. If a user can misconfigure a system, they will.
  3. If a user can bypass security and safety systems, they will.
  4. If a user can get confused, they will.
  5. If a developer can make a mistake, they will.
  6. If a user, developer, or manager can forget to do something, they will.
  7. If a user, developer, or manager can be tempted to cheat or steal, they will.
  8. If a system has a vulnerability, someone will seek to exploit it.
  9. If someone can profit from the mistakes of others, they will.
  10. Select workers with appropriate education.
  11. Give workers appropriate training.
  12. Give workers appropriate assignments.
  13. Give workers appropriate responsibility.
  14. Manage workers properly.
  15. Supervise workers properly.
  16. Monitor workers as needed.
  17. Review workers properly.
  18. Coach workers properly.
  19. Terminate workers when necessary.
  20. Reassign workers when necessary.
  21. Be prepared for the unexpected. Expect the unexpected.

Access pattern — Identity

These are general access patterns for identity, spanning contrived, real, and anonymous user identity use cases.

  1. Creation of a new identity.
  2. Creation of a fake identity for research purposes.
  3. Creation of a fake identity for testing purposes.
  4. Creation of a fake identity for training purposes.
  5. Creation of a fake identity for fraudulent purposes.
  6. Detect fraudulent fake identities and treat as an attack.
  7. Detect bulk creation of fake identities from the same source. Block future identity creation from that source.
  8. Assuming identity of a deceased person.
  9. Creating a user name.
  10. Creating a user ID.
  11. Creating a password.
  12. Creating a strong password.
  13. Creating a weak password.
  14. Disallowing creation of a weak password.
  15. Storing passwords — safely. Hashed with a one-way hash.
  16. Storing passwords — unsafely. Clear text. Or a reversible hash.
  17. Creating two-factor authentication.
  18. Providing security questions and responses.
  19. Storing identities and related information. Maintaining a database.
  20. Logging in using identity credentials. User name or id and password, etc.
  21. Logging in using two-factor authentication. Email, cell phone text/call, landline call.
  22. Logging of login attempts.
  23. Failed login attempt.
  24. Failed login attempt — retry.
  25. Failed login attempt — potential cyberattack.
  26. Identity credential theft or compromise.
  27. Identity theft.
  28. Writing password and user ID on a Post-it note placed on PC or desk. Bad idea, but it happens.
  29. Logging in using credentials borrowed from another user. It happens, but is a bad idea and needs to be discouraged or somehow prevented.
  30. Login while already logged in elsewhere. Looks suspicious, should be disallowed, and possibly treated as a possible attack with compromised credentials. Or, it could be innocent, like logged in at home and work.
  31. Lock screen whenever leaving keyboard and screen unattended.
  32. Unlock screen on return.
  33. Login for servers. Warrants greater care and greater security. Credentials should be changed frequently, especially whenever anybody leaves the group responsible for a server.
  34. Law enforcement or courts may request or demand access to user identity information and associated user data.

Access pattern — Contrived Identity

  1. Covered by Access pattern — Identity.

Access pattern — Real Identity

  1. Covered by Access pattern — Contrived Identity.
  2. Provide proof of real identity.

Forms and elements of real identity include:

  1. Full name.
  2. Birth date.
  3. Social security number.
  4. Mother’s maiden name.
  5. Driver’s license.
  6. Birth certificate.
  7. Passport.
  8. Bill. Utility, etc.
  9. Lease. Or mortgage.
  10. Account statement.
  11. Biometric scan — fingerprint, hand, eye, facial, voice.

Any of these elements may be real or forged/faked.

Access pattern — Anonymous Identity

  1. Covered by Access pattern — Contrived Identity.
  2. User may go to extra efforts to mask their identity, such as browsing in incognito or other anonymous browsing modes.
  3. Law enforcement and courts may still gain access to user identity and user data, as the law and legitimate warrants might permit.
  4. Some systems or software may in fact permit fully anonymous activity such that even a court warrant and expert technical skills cannot bypass the technical methods used to secure the account and identity.

Access pattern — Accounts

  1. Create new account.
  2. Associate identity with account. Contrived, real, or anonymous.
  3. Associate online account with an offline account. Such as bank, brokerage or investment, credit card, utility.
  4. Provide full name.
  5. Provide address.
  6. Provide email address.
  7. Provide profile information.
  8. Accept default options.
  9. Selectively opt in.
  10. Selectively opt out.
  11. Update account.
  12. View account details.
  13. View account activity.
  14. Create alerts to receive notifications on account activity and conditions.
  15. Manage alerts.
  16. Delete alert.
  17. Close account.
  18. Order products or services.
  19. Provide billing information.
  20. Provide shipping information.
  21. Initiate transactions.
  22. View statements.
  23. Request assistance.

Access pattern — Applications, Data, and Users

Organizations and users critically depend on online applications perform a lot of functions, most of which require data, much of which is supplied by users, and all of which is a target for hackers.

  1. Run an online application.
  2. Supply credentials to gain access to the application.
  3. Create new records.
  4. Enter data.
  5. Update existing records.
  6. Delete records.
  7. Search records.
  8. Maintain data in databases and files.
  9. Maintain access controls for data.
  10. Optionally encrypt underlying data.

Access pattern — User-Created Data and Content

  1. Create data or content.
  2. Modify data or content.
  3. Delete data or content.
  4. Decide to share data or content — selectively.
  5. Decide to share data or content — publicly.
  6. Decide to unshare data or content.
  7. Define licensing for shared data or content.
  8. Encrypt data or content.
  9. Decrypt data or content.
  10. Unauthorized access — viewing.
  11. Unauthorized access — modification, deletion.
  12. Unauthorized access — creation of new data or content. Fake.

Access pattern — Financial Transaction Data

Banks, credit cards, and other financial institutions.

  1. Deposits.
  2. Withdrawals.
  3. Transfers.
  4. Wire transfers.
  5. ACH transfers.
  6. Legitimate transactions.
  7. Fraudulent transactions.
  8. Mistaken transactions.
  9. Interest.
  10. Loan payments.
  11. Charges.
  12. Fees.
  13. Charges.
  14. Reversed charges.
  15. Payments.
  16. Debits.
  17. Address or other account change — authorized.
  18. Address or other account change — unauthorized.
  19. Access to user financial records — authorized.
  20. Access to user financial records — unauthorized.
  21. Access to user transaction data — authorized.
  22. Access to user transaction data — unauthorized.
  23. Bulk copy of user financial data — authorized. IT may have good reason, but it should be examined closely.
  24. Bulk copy of user data — unauthorized. Theft.
  25. Financial controls. Who can do what within a financial organization.
  26. Financial control logging.
  27. Financial control auditing.

Access pattern — Web Browsing

  1. Browse with a valid and reasonable URL.
  2. Browse with a mistaken URL which takes the user to a malevolent web page that seeks to disinform or defraud the user. Or possibly to download malware or otherwise expose the user to a cyberattack.
  3. Browse in incognito mode. So that servers and web sites cannot track browsing with cookies or other means.
  4. Enable cookies.
  5. Disable cookies.
  6. Access cookies — legitimate.
  7. Access cookies — illegitimate.
  8. Record history of web pages browsed.
  9. Access web page history — legitimate.
  10. Access web page history — illegitimate.
  11. Access encrypted web page.
  12. Decrypt web page.
  13. Browse web pages in incognito mode.
  14. HTML script execution. May trigger a virus.
  15. Access download cache — legitimate.
  16. Access download cache — illegitimate.
  17. Access web page cache — legitimate.
  18. Access web page cache — illegitimate.
  19. View benevolent ads.
  20. View malevolent ads. May trigger a virus.

Access pattern — Email

  1. Creating new account. Creation of a new identity.
  2. Login access. Credential validation.
  3. Composing email.
  4. Sending mail.
  5. Receiving email.
  6. Viewing email messages.
  7. Replying to email.
  8. Clicking on links in email messages.
  9. Previewing link URLs for links in email messages.
  10. Clicked link opens a legitimate web page.
  11. Clicked link opens a malevolent web page — simple SPAM marketing.
  12. Clicked link opens a malevolent web page — fraud, phishing.
  13. Viewing email attachments.
  14. Saving email attachments to files for access outside of email.
  15. Archiving email.
  16. Deleting messages
  17. Managing archived email.
  18. Creating folders for saving messages.
  19. Saving messages to folders.
  20. Moving messages between folders.
  21. Deleting messages in folders.
  22. Purging deleted messages.
  23. Email retention policies.
  24. Email attachments — media.
  25. Email attachments — PDF and slide presentations.
  26. Email attachments — office documents (word processing, spreadsheet, presentations).
  27. Email attachments — ZIP files — expected (rarely).
  28. Email attachments — executables — expected (very rarely).

Summary of possible cyberattacks for email:

  1. Identity credential theft or compromise.
  2. Spoofing. Falsified message header to mislead recipient about identity of sender.
  3. Phishing. Tricking recipient into providing credentials or personal information by faking an authoritative sender and a request to supply login credentials on a fake but genuine-looking web page.
  4. Spear phishing. Targeted phishing, targeting specific organizations or even specific individuals.
  5. Whaling. Phishing of spear phishing for senior officials in organizations — the biggest fish.
  6. Link manipulation. Looks like a reasonable link, but some subtle difference leads to an undesirable web page.
  7. Email attachments — ZIP files — unexpected, malevolent attack.
  8. Email attachments — executables — unexpected, malevolent attack.
  9. SPAM. Generally more of an annoyance, but may be fraudulent as well.

Access pattern — Email Servers

The email access pattern is concerned with the activities of the user, on the user’s personal device (personal computer, tablet, smartphone), while the email server access pattern is concerned with what happens on the server ou in the network which actually sends and receives email.

  1. Set up new email server.
  2. Configure email server.
  3. Manage accounts on email server.
  4. Maintain database of email account credentials.
  5. Create email account upon request.
  6. Update email account upon request.
  7. Delete email account upon request.
  8. Send email message upon request. Actually, queue it up to be sent, try to send it to the destination email server, wait if unable to send, and timeout if still unable to send.
  9. Receive email message.
  10. Validate email address for incoming message.
  11. Bounce or reject messages addressed to invalid email addresses.
  12. Auto-respond to messages for a particular email address, as directed for that account.
  13. Auto-forward messages for a particular email address, as directed for that account.
  14. Perform anti-virus checks on incoming messages. Quarantine as needed.
  15. Perform spam checks on incoming messages. Divert to Spam folder as configured.
  16. Move message from inbox to a folder, as directed by the user.
  17. Manage folders and archives of saved messages
  18. Manage folder of sent messages.
  19. Move messages between folders as directed by the user.
  20. Delete saved messages as directed by the user.
  21. Restart server.
  22. Shut down server.
  23. Potential for corruption of the underlying databases and files for the platform.
  24. Potential for denial of service attacks on the platform.

Access pattern — Social media

There are many different social media platforms. The access patterns listed here are intended to be generic and reasonably representative, but specific platforms may have additional access patterns or nuances and differences.

  1. Create new account. Creation of a new identity.
  2. Create a new non-public account.
  3. Login. Credential validation.
  4. Create a new post.
  5. Include links in posts.
  6. Embed media in posts.
  7. View posts.
  8. Comment on the posts of others.
  9. View comments on a post.
  10. Examine identity of a poster.
  11. Examine identity of a comment on a post.
  12. Reply to a comment of others.
  13. Edit a previous post.
  14. Delete a previous post.
  15. Browse old posts.
  16. Search old posts.
  17. Delete account.

Summary of possible cyberattacks for social media:

  1. Identity credential theft or compromise.
  2. Unintentional sharing of identity credentials.
  3. Ill-advised sharing of identity credentials.
  4. Posting by other than owner of identity.
  5. Deleting post by other than owner of identity.
  6. Direct access to underlying data files and databases. Can be read in bulk, edited, corrupted, or deleted.
  7. Deleting account by other than owner of identity.
  8. Potential for corruption of the underlying databases and files for the platform.
  9. Potential for denial of service attacks on the platform.

Access pattern — Encrypted Messaging

Some messaging platforms, such as Telegram, permit heavily encrypted operation so that neither a random hacker, nor law enforcement armed with a legitimate warrant, nor a determined government can view the underlying messages, in theory.

  1. Compose, encrypt, and send encrypted message.
  2. Receive, decrypt, and view encrypted message.
  3. Quickly and permanently erase and destroy an encrypted message.
  4. Download encrypted messaging application — legitimate.
  5. Download encrypted messaging application — illegitimate, fake. Designed to mislead user into believing that their messages are more secure than they really are.
  6. Internet Service Provider or router may block access to traffic and protocols used by the encrypted messaging application.

Access pattern — VPN — Virtual Private Network

A Virtual Private Network (VPN) is application software running on an endpoint, such as a personal computer, tablet, or smartphone, which allows a user to connect from or over a public network into a private network, an internal network of an organization, as if they were directly connected to that non-public network. All of the user’s command and data transmission traffic over the VPN is fully and securely encrypted so that no devices on the public network can eavesdrop, in theory.

  1. Connect to a remote, private, internal network.
  2. Browse the web, use email, use social media, and all other Internet applications and protocols, as if directly connected to that remote network.
  3. Disconnect from remote network.
  4. Download VPN software — legitimate.
  5. Download VPN software — illegitimate, fake. Designed to mislead user into believe that their VPN Internet access is more secure than it really is.
  6. Internet service provider or router may block use of the VPN protocols.

Access pattern — Cyber Services

Web services. Any networked service using Internet protocol. Typically application software running on a networked server. Excludes the application software itself — see Access pattern — Application Software Development.

  1. Specify requirements for servers.
  2. Acquire servers.
  3. Install application software on a server.
  4. Test application software internally on a server, not connected to the outside world.
  5. Connect a server to the Internet.
  6. Disconnect a server from the Internet.
  7. Specify requirements for routers.
  8. Acquire routers
  9. Deploy routers.
  10. Configure routers.
  11. Test routers.
  12. Monitor routers.
  13. Replace routers.
  14. Specify firewalls.
  15. Acquire firewalls
  16. Deploy firewalls.
  17. Configure firewalls.
  18. Test firewalls.
  19. Monitor firewalls.
  20. Replace firewalls.
  21. Capacity planning.
  22. Configure redundant servers to handle load.
  23. Create data centers to manage and distribute load.
  24. Balance load between data centers.
  25. Balance service requests between servers.
  26. Throttle service requests.
  27. Monitor network traffic.
  28. Upgrade servers.
  29. Upgrade operating system software.
  30. Deploy cybersecurity software, products, and services.
  31. Monitor cybersecurity software, products, and services.

Access pattern — Academic Institutions

  1. Same cybersecurity exposures as any other enterprise.
  2. Online course enrollment.
  3. Online course status.
  4. Online course database.
  5. Technology courses. Cybersecurity aspects.
  6. Cybersecurity courses.
  7. Abstract concepts for cybersecurity.
  8. Practical, vocational aspects of cybersecurity. Job skills.
  9. Technology research. Cybersecurity aspects.
  10. Cybersecurity research — theory.
  11. Cybersecurity research — abstract concepts.
  12. Cybersecurity research — applied, practical results.
  13. Promoting awareness and skills for cybersecurity.

Access pattern — Internet of Things (IoT) Devices

  1. Specify requirements for devices.
  2. Acquire devices.
  3. Test devices.
  4. Deploy devices.
  5. Device control — authorized.
  6. Device control — unauthorized.
  7. Manage devices.
  8. Enable devices.
  9. Disable devices.
  10. Remove devices from service.
  11. Monitoring device control.
  12. Monitoring device data traffic.
  13. Updating device data database — authorized.
  14. Updating device data database — unauthorized.

Access pattern — Health and Medical Records

  1. Viewing — authorized.
  2. Viewing — unauthorized, but still within organization.
  3. Viewing — unauthorized, from outside of organization.
  4. Copying — authorized.
  5. Copying — unauthorized.
  6. Delivering copy of records to a patient — authorized.
  7. Delivering copy of records to a patient — unauthorized. Attempted theft.
  8. Receipt of transferred records — legitimate.
  9. Receipt of transferred records — illegitimate. Shady, fraudulent.
  10. Deletion. Never a good idea.
  11. Modification — authorized.
  12. Modification — unauthorized, but still within organization.
  13. Modification — unauthorized, from outside organization.
  14. Audit logging of all changes.
  15. Copying of audit log — unauthorized. Still theft, possibly of value to someone.
  16. Direct file modification. Bypassing application.
  17. Bulk theft of records.
  18. Bulk copy of underlying files or databases — authorized. IT staff moving application.
  19. Bulk copy of underlying files or databases — unauthorized, but still within organization. Very dubious, should be investigated.
  20. Bulk copy of underlying files or databases — unauthorized, from outside the organization.
  21. Analysis — authorized.
  22. Analysis — unauthorized, but still within organization.
  23. Analysis — unauthorized, from outside of organization.
  24. Sharing of anonymized data with legitimate research organizations.
  25. Sharing of anonymized data — unauthorized, but still within organization.
  26. Sharing of anonymized data — unauthorized, from outside of organization. Theft.
  27. Authorizing who should have access to health and medical records.

Access pattern — Medical Systems

Equipment within a health care facility, or possibly in a patient’s residence. Distinct from medical devices implanted in patients.

  1. Control operations of a health facility.
  2. Disrupt operations of a health facility.
  3. Access to patient records.
  4. Access to medical devices within health facility.
  5. Access to remote medical devices.
  6. Access stored data from medical devices.
  7. Telemedicine.

Access pattern — Medical Devices

Medical devices implanted in patients, as opposed to equipment used within a health care facility.

  1. Access data from medical device — authorized.
  2. Access data from medical device — unauthorized.
  3. Store data from medical device — authorized.
  4. Store data from medical device — unauthorized.
  5. Control of device — authorized.
  6. Control of device — unauthorized, but still within facility. May or may not be malevolent.
  7. Control of device — unauthorized, from outside the facility. May or may not be malevolent.
  8. Intent to cause patient discomfort.
  9. Intent to harm patient.
  10. Intent to kill patient.
  11. Access to devices which have not yet been implanted.
  12. Access to devices which have been removed from patients.

Access pattern — Election Systems

  1. Registering a new voter — legitimate.
  2. Registering a new voter — fraudulent.
  3. Updating registration for a voter — legitimate.
  4. Updating registration for a voter — fraudulent.
  5. Purging registration of a voter — legitimate.
  6. Purging registration of a voter — fraudulent.
  7. Purging registration of a voter — inadvertent, mistake.
  8. Checking in a voter.
  9. Recording vote of a voter.
  10. Storing vote of a voter.
  11. Absentee ballots.
  12. Early voting.
  13. Online voting.
  14. Tallying and tabulating votes.
  15. Reporting of voting results.
  16. Auditing voting results.
  17. Auditing individual votes.
  18. Challenging voting results.
  19. Challenging individual votes.
  20. Sharing of voter registration data — legitimate.
  21. Sharing of voter registration data — fraudulent.
  22. Sharing of voter registration data — inadvertent, mistake.
  23. Design of voting machines.
  24. Development of voting machines.
  25. Manufacture of voting machines.
  26. Testing of voting machines.
  27. Maintenance of voting machines.
  28. Auditing of voting machines.
  29. Loading of ballots into voting machines.
  30. Testing of ballots loaded into voting machines.
  31. Electronic access to voting machines — legitimate.
  32. Electronic access to voting machines — fraudulent..
  33. Access to voter registration database — legitimate.
  34. Access to voter registration database — illegitimate.

Access pattern — Network Design

  1. Purpose of the network.
  2. Name or otherwise identify the network.
  3. Vision of the network.
  4. Mission of the network.
  5. Strategic objectives of the network.
  6. Assessment of scope of the organization.
  7. Technical architecture of the network.
  8. General review of and commitment to vision, mission, scope, strategic objectives, and technical architecture of the network by all relevant stakeholders, including IT staff, cybersecurity staff, management, application development groups, senior management of business units, and executives.
  9. Capacity planning.
  10. Assessment of facilities to be connected by the network.
  11. Assessment of needs for data centers and expected growth rates.
  12. Assessment of types of endpoints, needs of users, total number of users, and expected growth rates.
  13. Assessment of workers and computers and devices outside of facilities connecting to internal network and expected growth rates.
  14. Assessment of forms of data, amounts of data, and expected growth rates.
  15. Assessment of needs for servers, and expected growth rates.
  16. Assessment of needs for routers, and expected growth rates.
  17. Assessment of needs for firewalls, and expected growth rates.
  18. Assessment of needs for external cloud services and expected growth rates.
  19. Assessment of external demands for proprietary cyber services to be provided to the public and expected growth rates.
  20. Assessment of use of external cloud service providers and expected growth rates.
  21. Assessment of external web services required by the network and expected growth rates.
  22. Assessment of software and services needed to manage the network.
  23. Assessment of cybersecurity software and services needed to protect the network.
  24. Assessment of physical facilities needed to house and support the network.
  25. See also Access pattern — IT Staff.
  26. See also Access pattern — Cybersecurity Staff.

Access pattern — Data Centers

  1. Design of overall organization network. See Access pattern — Network Design.
  2. Capacity planning.
  3. How many data centers needed now?
  4. Forecast future data center needs.
  5. Design of network within a particular data center.
  6. Cybersecurity considerations across global network for organization.
  7. Cybersecurity considerations within each data center.
  8. Cybersecurity staff who will be needed within each data center.
  9. Cybersecurity staff who can service more than one data center.
  10. Staff needed to bring up a new data center. No longer needed on-site after data center has gone operational.
  11. Staff needed to operate a particular data center on an ongoing basis.
  12. Planning for a data center.
  13. Implementation of a data center.
  14. Testing a new data center.
  15. Acceptance testing for a new data center.
  16. Transition of a new data center to full operations.
  17. Evolution of a data center. Expansion. Upgrading systems. Decommissioning old systems.

Access pattern — Semi-public Online Services

Online services whose access is relatively tightly controlled, in contrast to completely open public cyber services.

  1. Vision of the service.
  2. Specification of criteria for providing access.
  3. Specification of vetting process.
  4. Specification of review of vetting process.
  5. Accepting application for use of service.
  6. Vetting application for use of service.
  7. Approving application for use of service.
  8. Rejecting application for use of service.
  9. Defining personas for service and data access.
  10. Defining scope of service and data access for each persona.
  11. Monitoring service and data access.
  12. Terminating access to service and data.
  13. See also Access pattern — Cyber Services.

Access pattern — Data Access

This includes the databases and data files for online applications and user data, as well as configuration files which govern operation of the system, including security and access control.

  1. Severely restrict data access.
  2. Very selectively enable data access.
  3. Carefully review requests for data access.
  4. Restrict enabled data access.
  5. Monitor data access.
  6. Log data access.
  7. Audit data access.
  8. Read file.
  9. Create file.
  10. Copy file.
  11. Modify file.
  12. Delete file.
  13. Rename file.
  14. Query database.
  15. Update database data.
  16. Update database structure.
  17. Delete data from database.
  18. Delete database.
  19. Read directory of files.
  20. Elevate privileges to gain access to protected data — legitimate. Sometimes, rarely.
  21. Elevate privileges to gain access to protected data — illegitimate.
  22. Log all attempts to elevate privileges.
  23. Log all data access using elevated privileges.
  24. Require separate, manual second-party approval for elevating privileges.

Access pattern — Remote Access

Remote access includes any form of remote login or connection, such as Telnet and Remote Desktop Connection, which have potentially very severe cybersecurity risks.

  1. Severely restrict remote access.
  2. Very selectively enable remote access.
  3. Carefully review requests for remote access.
  4. Restrict enabled remote access.
  5. Monitor remote access.
  6. Log remote access.
  7. Audit remote access.

Access pattern — IT Staff

Application development is covered under Access pattern — Application Software Development regardless of whether it is included under IT or is outside of IT proper.

Cybersecurity is covered under Access pattern — Cybersecurity Staff.

  1. Advocate for budgets and priorities — general.
  2. Advocate for budgets and priorities — cybersecurity.
  3. Selection of vendors — hardware.
  4. Selection of vendors — software.
  5. Selection of vendors — cybersecurity software.
  6. Acquisition — hardware.
  7. Acquisition — software.
  8. Acquisition — cybersecurity software.
  9. Install software.
  10. Installation of application software.
  11. Place code files on server for execution — legitimate.
  12. Place code files on server for execution — illegitimate.
  13. Installation test of application software.
  14. Deployment — hardware.
  15. Deployment — software.
  16. Deployment — cybersecurity software.
  17. Physical access to servers.
  18. Power supply for servers.
  19. Network access for servers.
  20. Provisioning to assure sufficient servers to handle normal load, peak load, and DOS attacks.
  21. Configuration of cybersecurity software.
  22. Change control of cybersecurity software.
  23. Software updates.
  24. Software updates — security patches.
  25. Patch code files — legitimate.
  26. Patch code files — illegitimate.
  27. Testing — hardware.
  28. Testing — software.
  29. Testing — cybersecurity software.
  30. Backup.
  31. Restore from backup.
  32. Security review on bug fixes and enhancements to software and services.
  33. Asset management. See Access pattern — Asset Management.
  34. Enable and support encryption. See Access pattern — Encryption.
  35. Detect botnets.
  36. Work with cybersecurity staff to disrupt botnets.
  37. Reducing complexity to reduce vulnerabilities.
  38. Managing and mitigating complexity to manage and mitigate vulnerabilities.
  39. Compliance with government regulations on cybersecurity
  40. Working with lawyers to ensure compliance with relevant law and regulation.
  41. Retaining consultants for specialized tasks and issues.

Access pattern — Cybersecurity Staff

This section is a brief summary of activities and tasks for cybersecurity staff. For greater detail, see the NIST NICE Framework.

The National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, or NICE Framework or just NICE for short, categorizes and describes cybersecurity work.

For a general overview of NICE, see:

For the actual NICE Framework, see:

This paper includes NICE work roles within personas, and tasks under access patterns.

NICE is a good start and has more detail for cybersecurity tasks, but this paper takes a somewhat broader view on the topic.

  1. Training — cybersecurity staff — general background
  2. Training — cybersecurity staff — internal operations and best practices
  3. Training — IT staff — general background
  4. Training — IT staff — internal operations and best practices
  5. Training — non-cyber/IT staff
  6. Outreach to rest of organization.
  7. Outreach to IT staff.
  8. Outreach to application developer staff.
  9. Outreach campaigns.
  10. Outreach reminders.
  11. Raising awareness of cybersecurity issues throughout the organization.
  12. Narratives — construction. Describing issues and scenarios in language that each persona can understand and relate to.
  13. Narratives — promotion.
  14. Education in general.
  15. Exercises, table tops.
  16. Communicate alerts on incidents.
  17. Communicate ongoing status for incidents.
  18. Communicate lessons learned for incidents.
  19. Alert and train people to be alert for attempted phishing attacks.
  20. Advocate for budgets and priorities.
  21. Vendor selection — hardware.
  22. Vendor selection — software in general.
  23. Vendor selection — cybersecurity software.
  24. Acquisition — hardware.
  25. Acquisition — software in general.
  26. Acquisition — cybersecurity software.
  27. Deployment — hardware.
  28. Deployment — software in general.
  29. Deployment — cybersecurity software.
  30. Provisioning to assure sufficient servers to handle normal load, peak load, and DOS attacks.
  31. Configuration — hardware.
  32. Configuration — software in general.
  33. Configuration — cybersecurity software.
  34. Testing — hardware.
  35. Testing — software in general.
  36. Testing — cybersecurity software.
  37. Monitoring — hardware.
  38. Monitoring — software in general.
  39. Monitoring — cybersecurity software.
  40. Monitoring authorized access.
  41. Monitoring unauthorized access.
  42. Monitoring access patterns.
  43. Monitoring user behavior patterns. Analytics.
  44. Monitoring for denial of service attacks.
  45. Monitoring systems for cybersecurity.
  46. Anonymizing data for sharing and analysis.
  47. Sharing data with government and industry.
  48. Monitoring shared cybersecurity data from government and industry.
  49. Revising practices based on shared data from government and industry.
  50. Attending conferences and workshops to keep up on latest technology, threats, and best practices.
  51. Monitoring of monitoring — assuring that monitoring is effective.
  52. Cybersecurity threat scanning.
  53. Cybersecurity event detection.
  54. Assessment of cybersecurity events.
  55. Classification of a cybersecurity event as an incident.
  56. Cybersecurity incident detection.
  57. Cybersecurity incident response.
  58. Cybersecurity incident recovery.
  59. Cybersecurity process refinement. Lessons learned.
  60. Develop and maintain security architectures.
  61. Identify risks.
  62. Address risks.
  63. Mitigate risks.
  64. Build, install, configure, and test dedicated cyber defense hardware.
  65. Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.
  66. Discover, deduce, and catalog entire attack surface area (vulnerabilities) for entire organization, including external services.
  67. Plan, implement, and monitor cybersecurity defenses for the entire attack surface area for the organization.
  68. Running a regular scan to check out for unpatched endpoints.
  69. Assess coverage of cybersecurity defenses for the entire attack surface area for the organization.
  70. Periodic review and assessment of all aspects of cybersecurity.
  71. Auditing specific operational areas of the enterprise.
  72. Auditing the entire organization for cybersecurity exposures.
  73. Incident management.
  74. Crisis management.
  75. Root-cause analysis.
  76. Lessons-learned review.
  77. Development, publication, and promulgation of best-practice recommendations.
  78. Assessment of cybersecurity risk.
  79. Development of cybersecurity improvement program.
  80. Continuous improvement.
  81. Accessing external services which may incur cybersecurity risks.
  82. Identifying other organizations which share similar cybersecurity concerns and sharing knowledge, policies, and practices with them, such as organizations in a particular sector such as banks, utility companies, manufacturing companies, chemical companies, etc.
  83. Broad disclosure of vulnerabilities and information sharing, especially Coordinated Vulnerability Disclosure (CVD).
  84. Compliance with government regulations on cybersecurity.
  85. Recognizing patterns of suspicious activity.
  86. Develop and facilitate data-gathering methods.
  87. Collecting digital evidence.
  88. Digital forensics.
  89. Cyber forensics.
  90. Network traffic analysis.
  91. Packet analysis.
  92. Detecting botnets.
  93. Measures to disrupt botnets.
  94. Crack encryption. When authorized, and legal.
  95. Uncrackable encryption. Research topic. Ongoing efforts to advance technology. For example, quantum computing.
  96. Asset management. See Access pattern — Asset Management.

Access pattern — Application Software Development

The specific software development process will vary between organizations, but the basic elements of any software development process are (or include):

  1. Work with product management on all stages of the software development process.
  2. Work with cybersecurity team at all stages of the process.
  3. Simple statement of purpose of the software. One-liner.
  4. Name the software.
  5. Define vision, mission, and strategic objectives for the software.
  6. Define functional architecture of the software.
  7. Define general functions and features of the software.
  8. Define specific functions and features of the software.
  9. Define detailed functions and features of the software.
  10. Define cybersecurity profile for the software.
  11. Design overall technical architecture of software.
  12. Design subsystem architecture of software.
  13. Design subsystem modules of software.
  14. Design individual modules of software.
  15. Design the user experience (UX).
  16. Develop test plan for software
  17. Develop sequenced development plan for functions.
  18. Develop sequenced development plan for modules and subsystems to support the sequencing of function development.
  19. Iterate development incrementally. At each stage adding more functions and features and demonstrating them to all key stakeholders.
  20. Code modules according to plan.
  21. Code tests for modules and subsystems in parallel or in advance of corresponding code for modules.
  22. Develop the user experience (UX).
  23. Test module code.
  24. Test subsystems.
  25. Test user experience functions and features.
  26. Integrate subsystems.
  27. Documentation plan.
  28. Overall documentation.
  29. Major feature documentation.
  30. Detailed feature documentation.
  31. Integrate full software.
  32. Demonstrate incremental progress to all relevant stakeholders, including management.
  33. Package full software.
  34. Test install full software.
  35. Test full software.
  36. Develop release criteria.
  37. Produce and test a series of releases candidates (RC).
  38. Release based on defined criteria.
  39. Provide alpha and beta pre-releases.

Access pattern — Asset Management

Asset management is a joint responsibility of the IT staff and the cybersecurity staff.

The IT staff may have nominal responsibility for keeping track of their own assets, but the cybersecurity staff will need to provide a second set of eyes to assure that no asset falls through the cracks. And to assure that any new types of assets are thoroughly evaluated before being introduced into the inventory of systems.

  1. Identify and catalog assets.
  2. Track acquisition of new assets.
  3. Assess vulnerabilities of each asset type.
  4. Protect each asset.
  5. Assess protection of each asset.
  6. Monitor each asset.
  7. Manage assets.
  8. Assess proposed new types of assets.
  9. Assure that decommissioned assets are thoroughly wiped clean so that a potential threat actor cannot discern any sensitive operational data or configuration information from the storage on that asset.

Access pattern — Encryption

  1. Make encryption software available to users.
  2. Make encryption options available to users.
  3. Encryption of data in flight (network access).
  4. Encryption of data at rest (on disk).
  5. End-to-end encryption.
  6. Encrypt data.
  7. Decrypt data.
  8. Respond to law enforcement requests to decrypt data.
  9. Respond to court order to decrypt data.
  10. Assessment of encryption alternatives and options.
  11. Ongoing education, training, and consulting to stay abreast of the latest advances in encryption techniques, tools, and products.

Access pattern — Application Developers

The emphasis here is on assuring that cybersecurity factors be taken into account when designing and developing computer software applications.

See Access pattern — Application Software Development for actual software development.

  1. Designing new applications.
  2. Emphasize secure by design.
  3. Securing recent applications.
  4. Securing legacy applications.
  5. Implementing code.
  6. Testing code.
  7. Testing all combinations of all security options.
  8. Deploying applications.
  9. Review of new application designs for cybersecurity factors.
  10. Review of existing application designs for cybersecurity factors.
  11. Review of legacy application designs for cybersecurity factors.
  12. Review of application development process for cybersecurity factors.
  13. Train entire application development staff on cybersecurity.
  14. Periodically review training of staff for cybersecurity.
  15. Ongoing training for staff on cybersecurity as technology and best practices advance.

Access pattern — Management

  1. Training — General awareness and background for cybersecurity.
  2. Training — Cybersecurity for management.
  3. Training — Assure that subordinates are fully trained for cybersecurity.
  4. Advocate for budgets and priorities for cybersecurity with senior managers and executives.
  5. Assign sufficient priority to cybersecurity.
  6. Budget sufficiently for cybersecurity.
  7. Request periodic briefings on cybersecurity status with each subordinate.
  8. Develop and review recruiting, hiring, and retention procedures for cybersecurity staff.
  9. Develop and review recruiting, hiring, and retention procedures for non-cybersecurity staff with regard to cybersecurity awareness and skills needed for even non-cybersecurity staff positions.
  10. Compliance with law government regulations on cybersecurity

Access pattern — Human Resources

  1. Develop and review recruiting, hiring, and retention procedures for cybersecurity staff.
  2. Develop and review recruiting, hiring, and retention procedures for non-cybersecurity staff with regard to cybersecurity awareness and skills needed for even non-cybersecurity staff positions.
  3. Access to personnel information — including positions and locations, and organizational structure — authorized.
  4. Access to personnel information — unauthorized.

Access pattern — Executives

  1. Same as for management in general.
  2. Advocate for budgets and priorities for cybersecurity with board of directors.

Access pattern — Training

Training would include:

  1. What each persona needs to know about cybersecurity.
  2. How much each persona needs to know about cybersecurity.

Categories of training:

  1. General background. The nature of the problem. General awareness. Everybody, at all levels, both workers and management in organizations and consumers.
  2. Cybersecurity staff.
  3. IT staff.
  4. Application development staff.
  5. All users throughout organization. Literally, anybody who might have a user name and password, need to access an internal system, or work with an external vendor who might have potential cybersecurity vulnerabilities.
  6. Management.
  7. Executives.
  8. Board of directors.
  9. Management for cyber services.
  10. Executives for cyber services.
  11. Board of directors for firms focused on or heavily dependent on cyber services.
  12. Customers.
  13. Contractors.
  14. Vendors.

Access pattern — Training — General background

  1. New employee orientation/onboarding. What everyone in the organization needs to know before they can be granted any access to the computing systems of the organization.
  2. New contractor/contractor orientation/onboarding. What every non-employee working in the organization needs to know before they can be granted any access to the computing systems of the organization. May be the same as for employees or more limited if less access is being granted.
  3. General awareness and background for all.
  4. Awareness and general background for consumers.
  5. Awareness and general background for users.
  6. Awareness and general background for workers.
  7. Awareness and general background for technical staff.
  8. Awareness and general background for technical team leaders.
  9. Awareness and general background for non-technical team leaders.
  10. Awareness and general background for technical managers.
  11. Awareness and general background for non-technical managers.
  12. Awareness and general background for application developers.
  13. Awareness and general background for IT staff.
  14. Awareness and general background for senior technical managers and executives.
  15. Awareness and general background for senior non-technical managers and executives.
  16. Awareness and general background for board of directors.
  17. Awareness and general background for regulators.
  18. Awareness and general background for policy makers.
  19. Awareness and general background for lawyers.
  20. Awareness and general background for judges.
  21. Awareness and general background for legislators.
  22. Awareness and general background for community leaders.
  23. Awareness and general background for citizens.
  24. More advanced general background when needed.
  25. Even more advanced general background when needed.

The point is that everyone needs basic awareness and general background, plus material a little more tailored to their persona, plus possibly some level of more advanced but still general background if the individual or group has somewhat more intense interest or needs.

Access pattern — Training — Cybersecurity Staff

  1. Technical staff. General.
  2. Technical staff. Specialized areas of cybersecurity.
  3. Training by vendors. Such as providers of cybersecurity products and services.
  4. Technical management.
  5. Senior and executive management.

Access pattern — Training — IT Staff

  1. Technical staff. General.
  2. Technical staff. Those with a focus on cybersecurity.
  3. Training by vendors. Such as providers of cybersecurity products and services or products which have a high potential for cybersecurity issues.
  4. Technical management.
  5. Senior and executive management.

Access pattern — Training — All Users in Organization

Beyond universal awareness and general background, all users in an organization should be trained in the specific cybersecurity issues that apply to all users or workers in that particular organization.

Literally, anybody who might have a user name and password, need to access an internal system, or work with an external vendor who might have potential cybersecurity vulnerabilities.

  1. Complete all required cybersecurity training.
  2. Importance of keeping all identity and account credentials secure.
  3. Importance of taking cybersecurity seriously.
  4. Importance of completing all required and suggested cybersecurity training.
  5. Importance of reporting any suspected cyberattacks.

Access pattern — Training — Management

Beyond universal awareness and general background, all managers in an organization should be trained in the specific cybersecurity issues that apply to all managers in that particular organization.

  1. Complete all required cybersecurity training.
  2. Assure that all subordinates receive required cybersecurity training.
  3. Assure that all subordinates assure that their subordinates receive required cybersecurity training.
  4. Appropriate priority for cybersecurity in their area of responsibility.
  5. Appropriate budgeting for cybersecurity in their area of responsibility.
  6. Cultivating a work culture of cybersecurity.

Access pattern — Training — Executives

Beyond universal awareness and general background, all executives in an organization should be trained in the specific cybersecurity issues that apply to all executives in that particular organization.

  1. Complete all required cybersecurity training.
  2. Assure that all subordinates receive required cybersecurity training.
  3. Assure that all subordinates assure that their subordinates receive required cybersecurity training.
  4. Appropriate priority for cybersecurity in their area of responsibility.
  5. Appropriate budgeting for cybersecurity in their area of responsibility.
  6. Cultivating an enterprise culture of cybersecurity.

Access pattern — Training — Board of Directors

Beyond universal awareness and general background, all members of the board of directors of the organization should be trained in the specific cybersecurity issues that apply to that particular organization.

  1. Complete all required cybersecurity training.
  2. Assure that all executives receive required cybersecurity training.
  3. Assure that all executives are aware of the importance of assuring that their subordinates receive required cybersecurity training and fully understand its importance.
  4. Appropriate priority for cybersecurity for the organization.
  5. Appropriate budgeting for cybersecurity for the organization.
  6. Cultivating an organizational and work culture of cybersecurity.

This training would be appropriate even for organizations which do not have a primary focus on cyber services.

Access pattern — Training — Management for Cyber Services

Beyond universal awareness and general background and cybersecurity training required for all managers in the organization, all managers in business units which provide or depend in some way on cyber services should be trained in the specific cybersecurity issues that apply to that particular business unit.

  1. Complete all required cybersecurity training.
  2. Periodic review of cybersecurity for the business unit.
  3. Appropriate priority for cybersecurity in the business unit.
  4. Appropriate budgeting for cybersecurity in the business unit.
  5. Assure that all subordinate staff receive cybersecurity training required for that business unit.
  6. Cultivating a work culture with a special priority on cybersecurity.

Access pattern — Training — Executives for Cyber Services

Beyond universal awareness and general background and cybersecurity training required for all executives in the organization, all executives in business units or divisions which provide or depend in some way on cyber services should be trained in the specific cybersecurity issues that apply to that particular business unit or division.

  1. Complete all required cybersecurity training.
  2. Periodic review of cybersecurity for the business unit or division.
  3. Appropriate priority for cybersecurity in the business unit or division.
  4. Appropriate budgeting for cybersecurity in the business unit or division.
  5. Assure that all subordinate staff receive cybersecurity training required for that business unit or division.
  6. Cultivating an organizational and work culture with a special priority on cybersecurity.

Access pattern — Training — Board of Directors for Cyber Services

Beyond universal awareness and general background and board of directors’ cybersecurity training that applies to all organization, all members of the board of directors of organizations which have a primary or significant focus on cyber services should be trained in the specific cybersecurity issues that apply to that particular organization’s cyber services.

  1. Complete all required cybersecurity training.
  2. Give cybersecurity a special priority in their thinking and discussion of all matters for the organization.
  3. Assure that all executives receive required cybersecurity training.
  4. Assure that all executives are aware of the importance of assuring that their subordinates receive required cybersecurity training and fully understand its importance.
  5. Cultivating an organizational and work culture with a special priority on cybersecurity.

Access pattern — Training — Customers

  1. Complete all required cybersecurity training.
  2. Training for cybersecurity when interacting with the organization.
  3. Training for cybersecurity considerations when working with products distributed and supported by the organization.
  4. Training for cybersecurity considerations when working with services provided by and supported by the organization.

Access pattern — Training — Contractors

Beyond universal awareness and general background, all contractors in an organization should be trained in the specific cybersecurity issues which apply to all users or workers in that particular organization. They may not need the full training that all in-house users and workers require, but enough to permit them to properly complete their work within the organization.

Literally, anybody who might have a user name and password, need to access an internal system, or work with an external vendor who might have potential cybersecurity vulnerabilities.

  1. Complete all required cybersecurity training.
  2. Importance of keeping all identity and account credentials secure.
  3. Importance of taking cybersecurity seriously.
  4. Importance of completing all required and suggested cybersecurity training.
  5. Importance of reporting any suspected cyberattacks.

Access pattern — Training — Vendors

Beyond universal awareness and general background, all vendor workers or contractors working in an organization should be trained in the specific cybersecurity issues that apply to all users or workers in that particular organization. They may not need the full training that all in-house users and workers require, but enough to permit them to properly complete their work within the organization.

Literally, anybody who might have a user name and password, need to access an internal system, or work with an external vendor who might have potential cybersecurity vulnerabilities.

  1. Complete all required cybersecurity training.
  2. Importance of keeping all identity and account credentials secure.
  3. Importance of taking cybersecurity seriously.
  4. Importance of completing all required and suggested cybersecurity training.
  5. Importance of reporting any suspected cyberattacks.

Access pattern — Workers

Access issues peculiar to workers within an organization, including employees, contract workers, vendor workers, and temporary workers, which consumers would not tend to have.

  1. Complete all required cybersecurity training.
  2. Identity. See Access pattern — Identity.
  3. Report lost security device or keys.
  4. Report door or windows ajar or open.
  5. Report suspicious behavior.
  6. Report requests to provide or coerce access or share credentials.
  7. Weak password, not updated frequently enough. Bad idea.
  8. Strong password.
  9. Change password if exposed or compromised.
  10. Report any incidents where someone else appears to have accessed their accounts.
  11. Change password frequently.
  12. Obtaining Wi-Fi credentials.
  13. Sharing Wi-Fi credentials — properly.
  14. Sharing Wi-Fi credentials — improperly.
  15. Using a USB drive — authorized.
  16. Using a USB drive — unauthorized.
  17. Visiting friends at office.
  18. Termination of workers. Prompt elimination of access.

Access pattern — Bluetooth Devices

  1. Monitoring data and media.
  2. Interfering with proper use.
  3. Mimicking a real device.
  4. Mimicking a rel computer.

Access pattern — Web Cameras

  1. Monitoring and capturing video from a user’s web camera. On their local computer or smart device.
  2. Surreptitiously turning on user web camera and capturing video.
  3. Disable web camera.
  4. Enable web camera.

Access pattern — Remote Web Cameras

  1. View live video stream — public, anyone.
  2. View live video stream — authorized.
  3. View live video stream — unauthorized.
  4. View snapshot images — public, anyone.
  5. View snapshot images — authorized.
  6. View snapshot images — unauthorized.
  7. Access metadata — public, anyone. Location, view, etc.
  8. Access metadata — authorized. Location, view, etc.
  9. Access metadata — unauthorized. Location, view, etc.
  10. Remote control of camera — public, anyone. Zoom, pan, tilt.
  11. Remote control of camera — authorized. Zoom, pan, tilt.
  12. Remote control of camera — unauthorized. Zoom, pan, tilt.
  13. Disable camera — authorized.
  14. Disable camera — unauthorized.
  15. Enable camera — authorized.
  16. Enable camera — unauthorized.
  17. Remotely configure camera — authorized.
  18. Remotely configure camera — unauthorized.

Access pattern — Video Surveillance Systems

  1. Same as remote web camera (see Access pattern — Remote Web Cameras), but likely without public access.
  2. Image processing software to detect motion, read text such as license plates, record and possibly recognize facial images.

Access pattern — Live Streaming Video

  1. Initiating a live stream — authorized.
  2. Initiating a live stream — unauthorized.
  3. Initiating a live stream — forbidden. May not be appropriate to live stream from some environments, such as secure areas. Visitors or new workers may be unaware of the policy or its importance.
  4. Properly tagging the source of the video.
  5. Falsely tagging the source of the video.

Access pattern — USB Drives

Generally, use of USB drives within organizations or on computers of the organization is frowned upon and to be discouraged.

Consumers use USB drives at their own risk.

Better to transfer data via the cloud or possibly email, and to update software via approved download methods.

  1. Copying of data — authorized.
  2. Copying of data — unauthorized.
  3. Copying of data — forbidden.
  4. Copying of code or software — authorized.
  5. Copying of code or software — unauthorized.
  6. Copying of code or software — forbidden.
  7. Facilitating installation of malware on a target computer.
  8. Installation of software — authorized.
  9. Installation of software — unauthorized.
  10. Installation of software — forbidden.

Access pattern — Wi-Fi

  1. Offer Wi-Fi within an office.
  2. Offer Wi-Fi within a public space of a business. Lobbies, conference facilities, et al.
  3. Offer Wi-Fi within a publicly-accessible facility. Coffee shops, cafes, et al.
  4. Offer Wi-Fi in non-commercial public spaces. Libraries, at al.
  5. Offer Home Wi-Fi.
  6. Configure Wi-Fi. Network name (SSID) and password.
  7. Decide whether and how to share credentials for access.
  8. Adequately provisioning an area for Wi-Fi service.
  9. Decide whether and how much to charge for Wi-Fi service.

Access pattern — Unauthorized Connected Devices

  1. Plug unauthorized device into protected network — unintentionally.
  2. Plug unauthorized device into protected network — with bad intentions.
  3. Unauthorized device accesses data.
  4. Unauthorized device uses remote access.
  5. Unauthorized device floods network with traffic.

Access pattern — Routers

  1. Specify routers.
  2. Acquire routers.
  3. Deploy routers.
  4. Configure routers.
  5. Set name and password for secure access.
  6. Monitoring data and media traffic.
  7. Interfering with proper use.
  8. Monitor load.
  9. Normal load.
  10. Unusual load — legitimate spikes.
  11. Unusual load — attempted denial of service (DOS.)
  12. Detect unusual load.
  13. Respond to DOS attack.
  14. Access credentials — proper use.
  15. Access credentials — unauthorized use.

Access pattern — Firewalls

  1. Monitoring data and media traffic.
  2. Interfering with proper use.
  3. Specify firewalls.
  4. Acquire firewalls.
  5. Deploy firewalls.
  6. Configure firewalls.
  7. Monitor and review configuration periodically.
  8. Verify that permitted access is successful.
  9. Verify that denied access fails.
  10. Monitor load.
  11. Normal load.
  12. Unusual load — legitimate spikes.
  13. Unusual load — attempted denial of service (DOS.)
  14. Detect unusual load.
  15. Respond to DOS attack.
  16. Access credentials — proper use.
  17. Access credentials — unauthorized use.

Access pattern — Network Connections

A dumb old cable may seem safe, but you never know what the other end of the cable really plugs into. Or what might be in the middle.

  1. Insert a hub or switch — for good intentions.
  2. Insert a hub or switch — for bad intentions.
  3. Monitoring data and media traffic — for good intentions.
  4. Monitoring data and media traffic — for bad intentions.
  5. Interfering with proper use.
  6. Redirect data and media.
  7. Modify data and media.
  8. Divert a copy of data and media.

Access pattern — Internet Service Providers (ISP)

  1. Monitoring data and media traffic.
  2. Interfering with proper use.
  3. Access credentials — proper use.
  4. Access credentials — unauthorized use.

Access pattern — Supply Chain Vulnerabilities

  1. Analyze component requirements.
  2. Evaluate alternative components.
  3. Choose component.
  4. Evaluate alternative vendors for a component.
  5. Evaluate supply chain vulnerabilities for a vendor for a component.
  6. Choose vendor.
  7. Periodically re-review supply chain assessment.

Access pattern — Personally-Identifiable Information (PII)

  1. User providing personally-identifiable information (PII).
  2. User updating personally-identifiable information (PII).
  3. User requesting personally-identifiable information (PII) to be forgotten.
  4. Service provider obtaining personally-identifiable information (PII).
  5. Service provider storing personally-identifiable information (PII).
  6. Service provider accessing personally-identifiable information (PII) — legitimate.
  7. Service provider sharing personally-identifiable information (PII) — explicitly authorized by user.
  8. Service provider sharing personally-identifiable information (PII) — implicitly authorized by user. Terms of service.
  9. Service provider sharing personally-identifiable information (PII) — unintentionally, negligently.
  10. Service provider sharing personally-identifiable information (PII) — improperly. In violation of terms of service, law, and regulation.
  11. Service provider sharing personally-identifiable information (PII) — with law enforcement.
  12. Accessing personally-identifiable information (PII) — unauthorized.
  13. Bulk theft of personally-identifiable information (PII).

Access pattern — Collection of User Data

  1. Collection of data about a user. Mostly by tracking user activities in application software.
  2. See also Access pattern — Sharing of User Data.
  3. See also Access pattern — Marketing of User Data.

Access pattern — Sharing of User Data

  1. Inform user that data may be shared as a result of accepting Terms of Service.
  2. Offer user opportunity to opt out of sharing their data. Default to opt in.
  3. Offer user opportunity to opt in to share their data. Default to opt out.
  4. Collection of data about a user.
  5. Share user data very selectively.
  6. Share user data generally.
  7. Share user data in bulk.
  8. Share user data only to other business units in the same organization.
  9. Share user data to other, commercial enterprises.
  10. Share user data only to other, noncommercial organizations.
  11. Share user data to research groups.
  12. Share anonymized user data to research groups.
  13. Share only anonymized user data to research groups.
  14. Market user data — see Access pattern — Marketing of User Data.

Access pattern — Marketing of User Data

  1. Inform user that data may be marketed and shared as a result of accepting Terms of Service.
  2. Offer user opportunity to opt out of marketing and sharing their data. Default to opt in.
  3. Offer user opportunity to opt in to market and share their data. Default to opt out.
  4. Market and share user data very selectively.
  5. Market and share user data generally.
  6. Market and share user data in bulk.
  7. Market and share user data only to other business units in the same organization.
  8. Market and share user data only to other, commercial enterprises.
  9. Market and share user data only to other, noncommercial organizations.

Access pattern — Law Enforcement

Roles of law enforcement in cybersecurity.

  1. Education. Outreach.
  2. Monitoring.
  3. Guidance.
  4. Assistance.
  5. Access to encrypted devices.
  6. Obtaining warrants for surveillance and access to encrypted data.
  7. Enforcing law and regulations where violation is a crime.

Access pattern — Cyber Warfare

  1. Defend military forces, military installations, and infrastructure against cyberattack, whether foreign state, terrorist, or criminal organization.
  2. Defend computing and communication systems against physical attack.
  3. Offensive cyber operations against adversary computing and communication systems.
  4. Offensive cyber operations against adversary military forces and installations.
  5. Offensive cyber operations against adversary infrastructure.
  6. Disinformation campaigns.
  7. Troll farms and other methods for psychological warfare.

Access pattern — Insurance

  1. Write policies for liability for losses from cyberattacks.
  2. Buy insurance policy for liability for losses from cyberattacks.
  3. Payment for liability for losses from a cyberattack.
  4. Payment of insurance premiums against losses from a cyberattack.

Access pattern — Vulnerabilities and Threats

Here is just a very brief summary of the major cybersecurity vulnerabilities and threats, at a high, abstract level, intended just to give a flavor and the overall scope.

For much greater detail and specificity for specific vulnerabilities, see the NIST National Vulnerability Database (NVD).

  1. Privacy violation.
  2. Violation of civil liberties.
  3. Denial of service. And Distributed denial of service.
  4. Data breach.
  5. Financial theft.
  6. Intellectual property (IP) theft.
  7. Intellectual property (IP) tampering.
  8. Intellectual property (IP) destruction.
  9. Targeted data access, theft of targeted credentials.
  10. Targeted data tampering.
  11. Targeted data destruction.
  12. Disruption of business (beyond network access DOS.)
  13. Botnets.
  14. Surveillance.
  15. Industrial espionage.
  16. Red team challenges.
  17. Whistleblowers.
  18. SPAM.
  19. Malware.
  20. Remote desktop connection — command execution — unauthorized.
  21. Telnet remote login and command execution — unauthorized.
  22. Privilege elevation to gain access to user data, system files, and system functions.
  23. Buffer overrun.
  24. Code injection.
  25. SQL injection.
  26. Ransomware.
  27. Payment for ransomware attack.
  28. Misleading domain name, file name, or file type which misleads user into accepting malevolent data.
  29. Man in the middle attacks.
  30. BIOS hacking.
  31. Chip hacking.
  32. Motherboard hacking.
  33. Access to personnel information — unauthorized.
  34. Cyber warfare.

See also the NIST National Vulnerability Database (NVD):

Access pattern — Offensive Threat Actors

These are activities that offensive threat actors commonly engage in.

See Access pattern — Vulnerabilities and Threats for a sense of the range of vulnerabilities which offensive threat actors target.

  1. Identify potential vulnerabilities.
  2. Identify potential exploits.
  3. Develop exploits.
  4. Test potential exploits.
  5. Upload exploits.
  6. Advertise exploits.
  7. Sell exploits.
  8. Focus on zero-day exploits. Those for which target systems have no defense.
  9. Design botnets.
  10. Develop botnets.
  11. Test botnets.
  12. Deploy botnets.
  13. Sell botnets.
  14. Trigger attacks from botnets.
  15. Design malware.
  16. Develop malware.
  17. Test malware.
  18. Distribute malware.
  19. Trigger malware attacks.
  20. Domain name hijacking
  21. Network and system scanning for open ports and applications
  22. Identity theft.
  23. Capturing and selling credit card data.
  24. Capturing and selling personally-identifiable information (PII).
  25. Money laundering.
  26. Activities as black hats — malevolent cyberattacks.
  27. Activities as white hats — assisting organizations to identify vulnerabilities and defend against cyberattacks.

Work in progress

This informal paper is a work in progress and will continue to be updated as I become aware of additional information or new ways of thinking about or organizing the information.

It may be incomplete, sketchy, or vague in some areas, which will be fleshed out more completely over time.

Consider it a draft, for now.

Future work

  1. Consider closer alignment between the concepts of this paper and the NIST frameworks, especially NICE categories, work roles, and tasks.
  2. Additional papers on aspects that were outlined as being beyond the scope of this paper.
  3. Additional refinement of specific personas, use cases, and access patterns and their categories.
  4. Addition of new or newly identified personas, use cases, and access patterns and their categories.
  5. More refined terminology.
  6. A glossary of relevant terms.

--

--

Jack Krupansky
Jack Krupansky

No responses yet