Learn more about available risk scenarios in Cyber Risk Quantification.
A risk scenario uses a specific combination of attack techniques, attack outcomes,
and business resources to describe how a cyber threat can impact your organization.
Scenario names follow the convention: attack outcome of business resource via attack
technique. Components that do not apply to a given scenario are not displayed in the
name.
For each enabled scenario, Cyber Risk Quantification analyzes the likelihood of occurrence
and estimates the potential financial loss. The calculation also considers your organization's
attack and threat detection history, connected data sources, peer data from similar
industries and regions, global threat intelligence, and business self-assessment data.
Results are presented as a predicted likelihood range and sets of estimated monetary
losses. A confidence level reflecting the completeness of available data is included.
The following table provides descriptions of some available risk scenarios.
|
Risk scenario
|
Description
|
|
Ransomware with data encryption
|
Threat actors access your organization's data and encrypt it, blocking access until
your organization pays a ransom.
|
|
Ransomware with data encryption via phishing
|
Threat actors access your organization's data through phishing techniques and encrypt
it, blocking access until your organization pays a ransom.
|
|
Ransomware with data exfiltration
|
Threat actors access your organization's data, transfer it to external systems, and
then encrypt it, blocking access or threatening publication until your organization
pays a ransom.
|
|
Data exfiltration
|
Threat actors access your organization's data and transfer it to external systems.
|
|
Data exfiltration via phishing
|
Threat actors access your organization's data through phishing techniques and transfer
it to external systems.
|
|
Data exfiltration of PII
|
Threat actors gain access to personally identifiable information (PII) in your organization
and transfer it to external systems.
|
|
Data exfiltration of PHI
|
Threat actors gain access to protected health information (PHI) in your organization
and transfer it to external systems.
|
|
Data exfiltration of PCI
|
Threat actors gain access to payment card industry (PCI) data in your organization
and transfer it to external systems.
|
|
Data exfiltration of sensitive information
|
Threat actors gain access to sensitive or valuable data in your organization and transfer
it to external systems.
|
|
Data leakage
|
Sensitive or valuable data in your organization's network is exposed due to misconfigurations,
employee error, or inadequate data handling practices.
|
|
Financial fraud via BEC
|
Threat actors fraudulently receive money, financial assets, or sensitive financial
information from your organization by using compromised or spoofed email accounts
to impersonate trusted individuals.
|
|
Financial fraud via phishing
|
Threat actors fraudulently receive money, financial assets, or sensitive financial
information from your organization through phishing techniques, including the use
of fraudulent emails, text messages, or websites.
|
|
Business interruption via DDoS attack
|
Threat actors flood your organization's servers, services, or networks with internet
traffic to disrupt business activity.
|
|
Business interruption via wiper attack
|
Threat actor malware permanently erases or corrupts data in your organization's information
systems to disrupt business activity.
|
|
Business interruption via malicious data corruption
|
Threat actors intentionally target and corrupt or alter specific data in your organization
to disrupt business activity.
|
|
Business interruption via system outage
|
IT infrastructure, services, or systems in your organization experience an unplanned
interruption in availability due to a cyberattack, hardware or software failure or
misconfiguration, power disruption, or human error.
|
