Threat Assessment

Summary

This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the organization. This consists of identifying a particular attacker's history of carrying out specific threats, their capability to carry out those threats currently, and proof that the threat has intent to leverage resources against the target.

Purpose

Checking the assumptions both of the organization and of the auditor by researching the current threats will ensure that an auditor is basing their work on accurate assessments of the conditions the organization faces and that they are making informed operational security considerations. With greater ownership of the process the staff provides an opportunity to explore their threat landscape and become more engaged in addressing the threats identified when the audit is complete. By engaging with as many staff as possible the auditor is providing a framework for staff to explore threat identification processes when the auditor is gone.

The Flow Of Information

Threat Assessment Information Flow

Guiding Questions

Approaches

Outputs

Operational Security

Preparation

Resources

Threat Assessment Activities

Example text for introducing threats - Integrated Security

Written exercise: Threats assessment - Integrated Security

Facilitators Manual (With PDF download of "Threat Introduction Example Text" and "Threat Assessment Written Exercises") - Integrated Security

Analyzing Threats: Chapter 3 - Workbook on Security: Practical Steps for Human Rights Defenders at Risk

Threat Modeling Resources (General)

Threat research by focus area

Threat research by method

  • Country threat reports 2,3
  • Examine Transparency Reports
    • Find most used sites in region. 4
    • Search for transparency reports for most used sites. 5

General Threats by Region

Technical Threats

Targeted Malware

Censorship and Surveillance Reports

Travel Threats

Activities

undefined


  1. Corruption Perception Index

  2. The ISC Project completes evaluations of information security threats in a broad range of countries. The resulting comprehensive written assessments describe each country’s digital security situation through consideration of four main categories: online surveillance, online attacks, online censorship, and user profile/access.

  3. EISF distributes frequent analysis and summaries of issues relevant to humanitarian security risk management.

  4. The top 500 sites in each country or territory.

  5. Who publishes Transparency Reports?

Activities

 

Developed with ❤ by

Information Innovation Lab

Applied research and development of public interest technology.