Introduction
In the field of cyber security, threat analysis serves as a foundational process for identifying, assessing, and mitigating potential risks to digital systems and data. This essay, written from the perspective of an undergraduate student studying cyber security, explores the concept of a threat analysis portfolio as a comprehensive collection of evaluated cyber threats. The purpose is to demonstrate a sound understanding of common threats, analytical methods, and their implications, drawing on established sources. Key points include an overview of prevalent cyber threats, techniques for analysis, and practical examples, highlighting the limitations and applicability of such knowledge in real-world scenarios. By examining these elements, the essay underscores the importance of proactive threat management in an increasingly digital landscape.
Understanding Cyber Threats
Cyber threats encompass a wide range of malicious activities that exploit vulnerabilities in information systems. As a student, I have learned that these threats can be broadly categorised into types such as malware, phishing, and ransomware, each posing unique risks to organisations and individuals. For instance, malware, including viruses and trojans, can infiltrate systems to steal data or disrupt operations (Singer and Friedman, 2014). A sound understanding reveals that threats are often state-sponsored or driven by cybercriminals seeking financial gain, as evidenced by reports from the UK’s National Cyber Security Centre (NCSC).
However, this knowledge has limitations; threats evolve rapidly, making static categorisations insufficient without ongoing updates. Indeed, the NCSC’s 2022 annual review highlights how geopolitical events, such as the Russia-Ukraine conflict, have amplified state-backed cyber attacks, including distributed denial-of-service (DDoS) assaults (NCSC, 2022). This awareness is crucial for building a threat analysis portfolio, which compiles these insights to inform defensive strategies. Generally, such a portfolio would include threat intelligence from reliable sources to ensure broad coverage, though it may overlook emerging, zero-day vulnerabilities due to their unpredictable nature.
Methods of Threat Analysis
Effective threat analysis employs structured methodologies to evaluate risks systematically. One common approach is the STRIDE model, which categorises threats based on spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege (Shostack, 2014). As a cyber security student, I apply this model to dissect potential attack vectors, supported by evidence from academic literature. For example, in analysing a phishing campaign, STRIDE helps identify information disclosure risks, where attackers impersonate trusted entities to extract sensitive data.
Another technique involves risk assessment frameworks like NIST’s Cybersecurity Framework, which guides identification, protection, detection, response, and recovery (NIST, 2018). This method draws on primary sources and research, allowing for evaluation of a range of views—such as quantitative risk scoring versus qualitative threat modelling. However, a critical approach reveals limitations; these methods require substantial resources and expertise, which may not be feasible for small organisations. Furthermore, while they address complex problems by prioritising threats, they sometimes fail to account for human factors, like insider threats, which arguably contribute to 74% of breaches according to some studies (Verizon, 2023). In compiling a portfolio, I would integrate these methods with tools like vulnerability scanners to demonstrate specialist skills in threat identification.
Case Studies in Threat Analysis
To illustrate practical application, consider the WannaCry ransomware attack of 2017, which affected over 200,000 computers globally, including UK NHS systems. Analysis of this event, as detailed in official reports, reveals exploitation of unpatched Windows vulnerabilities, leading to widespread disruption (NAO, 2018). From a student’s viewpoint, building a portfolio entry on WannaCry involves evaluating the threat’s impact—financial losses exceeding £92 million for the NHS—and drawing on evidence to propose mitigations like regular patching.
Another example is the SolarWinds supply chain attack in 2020, where hackers inserted malware into software updates, compromising numerous government and corporate networks (CISA, 2020). This case demonstrates the evaluation of perspectives, as it involved nation-state actors and highlighted supply chain vulnerabilities. Typically, a portfolio would include such analyses to show problem-solving abilities, identifying key aspects like detection delays and recommending multi-factor authentication. These examples, supported by verifiable sources, underscore the portfolio’s role in applying research to real threats, though they also expose gaps in predictive analysis for novel attacks.
Conclusion
In summary, a threat analysis portfolio in cyber security provides a structured repository for understanding threats, employing analytical methods, and learning from case studies like WannaCry and SolarWinds. This approach fosters a logical evaluation of risks, supported by evidence from sources such as NCSC and NIST, while acknowledging limitations in addressing rapidly evolving dangers. The implications are significant: for students and professionals alike, maintaining such a portfolio enhances preparedness and contributes to broader societal resilience against cyber threats. Ultimately, it encourages ongoing research and adaptation, ensuring that cyber security practices remain relevant in a dynamic field.
References
- CISA (2020) Alert (AA20-352A): Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations. Cybersecurity and Infrastructure Security Agency.
- NAO (2018) Investigation: WannaCry cyber attack and the NHS. National Audit Office.
- NCSC (2022) Annual Review 2022. National Cyber Security Centre.
- NIST (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. National Institute of Standards and Technology.
- Shostack, A. (2014) Threat Modeling: Designing for Security. John Wiley & Sons.
- Singer, P.W. and Friedman, A. (2014) Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
- Verizon (2023) 2023 Data Breach Investigations Report. Verizon.

