ENISA Cap04
ENISA Cap04
This section introduces a terminology (or dictionary) to speak about threats and causes.
This definition is based on the definition of a security incident as defined in the incident reporting guideline
(see also Section 2
(in the past).
The next section lists threat types. To explain what we mean with a threat type we give an example: A threat
type
cident.
Note that this list of threat types is not exhaustive. We do not claim to make a taxonomy of threats here.
There are a lot of threat lists or taxonomies out there, that can be more or less useful, depending on the
situation, but this particular list has been defined within the Art. 13a expert group, and represents the most
common threat types used by the telecom sector, in regard to the mandatory incident reporting activities.
We have not used a specific order for these threats, but grouped them according to similarities. For example
we grouped natural phenomena together.
4.1.3 Flood
Floods can impact physical infrastructure, such as server rooms, collocation sites, et cetera.
4.1.4 Earthquake
Earthquakes can impact physical infrastructure, such as power supply lines, underground and overland
cables, sites, et cetera.
3 This definition is similar to the definition in ISO27K5, which defines a threat as the cause of an incident.
10
Guideline on Threats and Assets
4.1.5 Wildfire
Wildfire can impact physical infrastructure, such as overland cables, overland power supply lines, collocation
sites, et cetera.
4.1.6 Fire
Fire 4 can damage physical infrastructure, such as cables, routers, server rooms, et cetera.
Note that this cause only covers accidental, unintentional instances of fire. For arson, see below.
Note that fire could also have an indirect impact, for example, when firefighters spray water or foam, or
when they give orders to turn off power generators.
4.1.7 Arson
Arson (a fire started intentionally) could damage physical infrastructure, such as cables, servers, sites, street
cabinets, et cetera.
Note there could also be an indirect impact, for example, when firefighters spray water or foam, or when
they give orders to turn off power generators.
11
Guideline on Threats and Assets
4.1.24 Overload
Overload of traffic and usage could impact the networks and services.
Note this is typically a secondary cause for an incident, when the primary cause is power cut.
12
Guideline on Threats and Assets
Note that this list of root causes types is not exhaustive. We do not claim to make a taxonomy of root causes
here. There are a lot of root causes lists or taxonomies out there, that can be more or less useful, depending
on the situation, but this particular list has been defined within the Art. 13a expert group, and represents
the most common root causes used by the telecom sector, in regard to the mandatory incident reporting
activities.
For example, suppose an employee of a provider made an error in following prescribed equipment
maintenance procedures. The maintenance error caused an outage. In this case the incident would be
For example, if an HLR suddenly stops operating because of a software bug, which prevents all
subscribers from connecting, then this in .
For example, heavy winds cause a cable cut, causing outages, then the incident would be in the root
.
13
Guideline on Threats and Assets
For example, incidents which have a root cause like a fire started by employees as an act of sabotage,
the the hacking of the provid
systems, vandalism directed at street cabinets, and so on.
For example, an outage caused by a cable cut caused by a mistake by the operator of an excavation
machine used for a building a new road, would be categori
- .
5 In the incident reporting this category is now used as a flag, in combination wi th another root cause category.
14