IOD Cyber Security Module 8 8.1 TVA Model Matrix THREAT TYPES ASSETS Onsite Banking Terminals Data Breach Malware/Ransomware - Unpatched software - Physical security weaknesses - Insider Threats - No Encryption - Weak authentication - Unpatched software - Lack of endpoint protection - Unauthorised software installs - Social engineering - Lack of user awareness/Training - Poor Encryption - Weak access Client/Partn controls er PII - Insider threat - Third-party risk - Social engineering - Phishing Attacks - Malicious attachments/download - Unsecured communication channels - Weak endpoint security - Insider threats Insider Threats DoS Attacks Unauthorised Access - Weak access controls - Misuse of privilege - Lack of monitoring/Auditing - Insider collusion - Insufficient employee awareness - Lack of traffic filtering - Inadequate network security - Software vulnerabilities - Insufficient system resources - Lack of DDoS mitigation measures - Insider threats - Lack of access controls - Software vulnerabilities - Default/Weak passwords - Poor physical security - Unauthorised access - Weak access controls - Insider collusion - Lack of monitoring - Lack of awareness - Lack if redundancy/failover systems - Insufficient network security - Single points of failure - Lack of load balancing - Resource exhaustion - Weak/Compromised user credentials - Insufficient access controls - Insecure data transmission/Storage - Insider threats - Third-party vulnerabilities Payment System Data - Insider threats - Poor transmission protocols - Poorly secured payment interfaces (Web portals etc) - Weak Authentication - Ransomware attacks - Unpatched software - Insider threats - Third-party risks - Lack of network segmentation - Social engineering - Unauthorised access - Weak access control - Insider collusion - Lack of monitoring - Insufficient employee awareness - Lack if redundancy/failover systems - Insufficient network security - Single points of failure - Lack of load balancing - Resource exhaustion - Weak authentication mechanisms - Insider threats - Insufficient access controls - Insecure transmission/storage of data - Third-party vulnerabilities ATM - Skimming devices - Poor physical security - Malware attack - Patch management - Network vulnerabilities (Encryption) - Unpatched software/OS - Physical tampering - Poor authentication mechanisms - No endpoint protection - Insecure network connections - Unauthorised access - Weak access control - Insider collusion - Lack of monitoring / Auditing - Insider knowledge of vulnerabilities - Network connectivity - Software vulnerabilities - Physical attacks - insufficient hardware resources - No intrusion detection/monitoring - Physical attacks - Weak/Compromised user credentials - Software vulnerabilities - Insufficient access controls - Insider threats Employees - Weak password management - Insider threats - Poor security awareness/Training - Improper handling of sensitive data - Insider collusion - Phishing attacks - Weak passwords - Lack of security awareness/training - Unauthorised software installs - Insider threats - Phishing / social engineering - Privileged access and misuse - Compromised - Weak or shared credentials credentials - Lack of security awareness - Insider threats - Unauthorised data handling - Lack of security - Insider collusion awareness - Unauthorised physical access - Weak/Compromised credentials - Insider threats - Lack of security awareness - Unauthorised physical access - Insufficient access controls 8.2 Risk Analysis Matrix IMPACT > LIKELIHOOD v ASSETS ATM THREAT TYPES Insider Threats - Unauthorised access - Weak access control - Insider collusion - Lack of monitoring / Auditing - Insider knowledge of vulnerabilities VA - (3) R - (12) - Unauthorised access - Weak access control - Insider collusion Payment - Lack of monitoring System Data - Insufficient employee awareness VA - (4) R - (16) DoS Attacks Unauthorised Access Data Breach Malware/Ransomware - Network connectivity - Software vulnerabilities - Physical attacks - insufficient hardware resources - No intrusion detection/monitoring VA - (3) R - (15) - Physical attacks - Weak/Compromised user credentials - Software vulnerabilities - Insufficient access controls - Insider threats VA - (4) R - (16) - Skimming devices - Poor physical security - Malware attack - Patch management - Network vulnerabilities (Encryption) VA - (4) R - (20) - Unpatched software/OS - Physical tampering - Poor authentication mechanisms - No endpoint protection - Insecure network connections VA - (4) R - (20) - Lack if redundancy/failover systems - Insufficient network security - Single points of failure - Lack of load balancing - Resource exhaustion VA - (3) R - (15) - Weak authentication mechanisms - Insider threats - Insufficient access controls - Insecure transmission/storage of data - Third-party vulnerabilities VA - (4) R - (16) - Insider threats - Poor transmission protocols - Poorly secured payment interfaces (Web portals etc) - Weak Authentication - Ransomware attacks VA - (4) R - (20) - Unpatched software - Insider threats - Third-party risks - Lack of network segmentation - Social engineering VA - (4) R - (20) Employees - Privileged access and misuse - Weak or shared credentials - Lack of security awareness - Unauthorised data handling - Insider collusion VA - (4) R - (16) - Unauthorised access - Weak access controls - Insider collusion Client/Partner - Lack of monitoring PII - Lack of awareness VA - (4) R - (16) Onsite Banking Terminals - Weak access controls - Misuse of privilege - Lack of monitoring/Auditing - Insider collusion - Insufficient employee awareness VA - (4) R - (16) - Phishing / social engineering - Compromised credentials - Insider threats - Lack of security awareness - Unauthorised physical access VA - (3) R - (15) - Weak password - Weak/Compromised management credentials - Insider threats - Insider threats - Poor security - Lack of security awareness awareness/Training - Unauthorised physical access - Improper handling of - Insufficient access controls sensitive data VA - (4) - Insider collusion R - (16) VA - (4) R - (20) - Phishing attacks - Weak passwords - Lack of security awareness/training - Unauthorised software installs - Insider threats VA - (4) R - (20) - Lack if redundancy/failover systems - Insufficient network security - Single points of failure - Lack of load balancing - Resource exhaustion VA - (3) R - (15) - Weak/Compromised user credentials - Insufficient access controls - Insecure data transmission/Storage - Insider threats - Third-party vulnerabilities VA - (4) R - (16) - Poor Encryption - Weak access controls - Insider threat - Third-party risk - Social engineering VA - (4) R - (20) - Phishing Attacks - Malicious attachments/download - Unsecured communication channels - Weak endpoint security - Insider threats VA - (5) R - (25) - Unpatched software - Physical security weaknesses - Insider Threats - No Encryption - Weak authentication VA - (4) R - (20) - Unpatched software - Lack of endpoint protection - Unauthorised software installs - Social engineering - Lack of user awareness/Training VA - (5) R - (25) - Lack of traffic filtering - Inadequate network security - Software vulnerabilities - Insufficient system resources - Lack of DDoS mitigation measures VA - (4) R - (20) - Insider threats - Lack of access controls - Software vulnerabilities - Default/Weak passwords - Poor physical security VA - (5) R - (20) Appropriate Strategies / Controls Insider Threats Access Controls: Implement strict access controls to limit employees' access to sensitive data and systems based on the principle of least privilege. This ensures that employees only have access to the resources necessary for their job responsibilities. DoS Attack DDoS Mitigation Services: Consider purchasing specialised Distributed Denial of Service (DDoS) mitigation services offered by third-party vendors. These services can detect and mitigate volumetric attacks by diverting traffic through their infrastructure before it reaches the bank's network. Unauthorised Access Strong Authentication: Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to ensure that only authorised individuals can access sensitive systems and data. This adds an additional layer of security beyond username and password. Data Breach Network Segmentation: Segregate the network and critical systems, using firewalls and access controls to restrict access to sensitive data. This minimises the potential impact of a breach by limiting the attacker's lateral movement within the network. Malware/Ransomware Antivirus/Anti-Malware Solutions: Deploy robust antivirus and anti-malware software on all endpoints, servers, and network gateways. Regularly update the software and run scheduled scans to detect and remove any malware or ransomware. Quantitative Risk Analysis by Calculating Return on Investment (ROI) Network Segmentation Cost: $100000 Data Breach Cost: $1,500,000 AV = $1,600,000 EF = 80% SLE = $1600000 x 80% = $1,280,000 Data lost Incident per year (1 every 5 years) = 0.2 ALE = $1280000 x 0.2 = $256,000 ROI = $156,000