A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate

被引:144
作者
Agrafiotis, Ioannis [1 ]
Nurse, Jason R. C. [2 ]
Goldsmith, Michael [1 ]
Creese, Sadie [1 ]
Upton, David [3 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford OX1 3QD, England
[2] Univ Kent, Sch Comp, Canterbury CT2 7NF, Kent, England
[3] Univ Oxford, Said Business Sch, Oxford OX1 1HP, England
来源
JOURNAL OF CYBERSECURITY | 2018年 / 4卷 / 01期
关键词
cybersecurity; risk; cyber-attack impacts; harm; organisational security; information systems;
D O I
10.1093/cybsec/tyy006
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
Technological advances have resulted in organizations digitalizing many parts of their operations. The threat landscape of cyberattacks is rapidly changing and the potential impact of such attacks is uncertain, because there is a lack of effective metrics, tools and frameworks to understand and assess the harm organizations face from cyber-attacks. In this article, we reflect on the literature on harm, and how it has been conceptualized in disciplines such as criminology and economics, and investigate how other notions such as risk and impact relate to harm. Based on an extensive literature survey and on reviewing news articles and databases reporting cyber-incidents, cybercrimes, hacks and other attacks, we identify various types of harm and create a taxonomy of cyber-harms encountered by organizations. This taxonomy comprises five broad themes: physical or digital harm; economic harm; psychological harm; reputational harm; and social and societal harm. In each of these themes, we present several cyber-harms that can result from cyber-attacks. To provide initial indications about how these different types of harm are connected and how cyber-harm in general may propagate, this article also analyses and draws insight from four real-world case studies, involving Sony (2011 and 2014), JPMorgan and Ashley Madison. We conclude by arguing for the need for analytical tools for organizational cyber-harm, which can be based on a taxonomy such as the one we propose here. These would allow organizations to identify corporate assets, link these to different types of cyber-harm, measure those harms and, finally, consider the security controls needed for the treatment of harm.
引用
收藏
页数:15
相关论文
共 81 条
[1]  
Acquisti A, 2006, P 3 INT C INT SYST I
[2]  
Agrafiotis I, 2016, CYBER HARM CONCEPTS, P23, DOI [10.2139/ssrn.2828646, DOI 10.2139/SSRN.2828646]
[3]  
Anderson R., 2009, MANAGING INFORM RISK, P55
[4]  
Anderson R., 2013, EC INFORM SECURITY P, P265
[5]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[6]   How Internet Security Breaches Harm Market Value [J].
Andoh-Baidoo, Francis Kofi ;
Amoako-Gyampah, Kwasi ;
Osei-Bryson, Kweku-Muata .
IEEE SECURITY & PRIVACY, 2010, 8 (01) :36-42
[7]  
[Anonymous], 2014, LAST MONTHS MASS TAR
[8]  
[Anonymous], 2015, HUFFINGTON POST
[9]  
[Anonymous], 2018, THE GUARDIAN
[10]  
[Anonymous], 2015, THE VERGE