=Paper=
{{Paper
|id=Vol-2933/paper27
|storemode=property
|title=Supplier Cybersecurity Risk Assessment Methodology
|pdfUrl=https://ceur-ws.org/Vol-2933/paper27.pdf
|volume=Vol-2933
|authors=Albena Tzoneva,Borislav Stoyanov
}}
==Supplier Cybersecurity Risk Assessment Methodology==
Supplier Cybersecurity Risk Assessment Methodology Albena Tzoneva and Borislav Stoyanov Chernorizets Hrabar Free University of Varna, Varna 9007, Bulgaria albenatz@gmail.com, borislav.stoyanov@vfu.bg Abstract. Supplier cybersecurity risk has increased significantly with the galloping introduction of new mobility trends in vehicle technologies and the emergence of fast to market providers of electrical components hardware. The risk for OEMs (Original Equipment Manufacturer) is compounded based on the tiered structure of the automotive supply chain. The global nature of the supply chain additionally exacerbates the issue due to local state policies and requirements. Lack of common standards further elevates the risk level. The demand for supplier risk assessment springs from the automotive manufacturers mission to provide safe and secure transportation. Their responsibility in safeguarding personal data and human lives is the utmost driver behind making supplier decisions. The demand lies in the fundamental cybersecurity industry asks for a reliable tool to assess risk level and make well-grounded business decisions. The objective of this paper is to provide a methodology for assessing third party cybersecurity risk on a component, sub-system, system, and enterprise levels. This methodology will deliver the following improvements: assess status with a live, reconfigurable model; provide the dollar amount for a particular risk level; feed into common requirements and set future product requirements; define company policies; -develop risk mitigation strategies; generate synergies between connected vehicle ecosystems and smart cities, and provide flexibility for a modular approach with interdependencies between modules. Keywords: Risk, Automotive, Cybersecurity. 1 Supplier risk assessment demand The demand for supplier risk assessment springs from the automotive manufacturers mission to provide safe and secure transportation. Their responsibility in safeguarding personal data and human lives is the utmost driver behind making supplier decisions. The demand lies in the following fundamental cybersecurity industry asks. A reliable tool to assess risk level and make well-grounded business decisions is in great demand by top level executives. High level management is responsible for the safety and security of customers. Strategic decisions can be facilitated by a risk assessment at the initiation of a project. Whether to produce a product or Copyright © 2021 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). provide a service in house vs. outsourcing can be justified by assessing the risk and implications to the company. Corporate financial losses can be detrimental if this responsibility is not fulfilled. Company image may be destroyed leading to de- valuation of the company stock and possible bankruptcy. Lawsuits may debilitate operations and the bottom line with millions of dollars spent on litigation. A risk assessment tool would play a significant role in preventing implica- tions on a national level. If products are a part of a system which is the case with connected vehicles, effects could be far reaching and of a large proportion. They can easily propagate to a national disaster. A risk assessment tool can serve as a competitive advantage. A proof of lesser risk exposure would bring more cus- tomers and contracts. It will help OEMs build a reliable supplier base that allows for in time delivery and quick to market execution. An assessment tool would indicate what measures are lacking and where budget allocation needs to go. Mitigating risk has a price and budget allocation decisions need to be founded on data. New mobility ecosystem brings significant complexity. Building a success- ful depth in defense strategy against cyber security threats requires tools to assess vulnerabilities and provide security status of the whole ecosystem tree. Building the future smart cities will be reliant on methods and tools already proven in as- sessing risk in the connected vehicle ecosystem. 1.1 Mobility landscape The automotive industry will be facing sweeping changes. Vast shifts will be necessary to enable the new mobility ecosystem. It has already incorporated many efficiencies afforded by the internet and computation. Navigant Research predicts that 75% of vehicles sold in 2035 will have some sort of autonomous capability [1]. ADAS systems (Advanced driver assistance systems) are already taking stage in numerous vehicles, paving the way for fully autonomous driving. The cars are becoming multifunction interactive platforms, opening avenues to the interconnected world. For example, technology like the space-astronaut robot Kirobo, developed by the University of Tokyo, Robo Ga- rage, and Toyota, could provide both automated driving and interactive commu- nication in the personal transportation systems of the future [2]. Today we get a preview of the challenges that mobility management will pose to enterprises and infrastructure. Ride hailing companies orchestrate net- works connecting those offering the service with the ones requiring it. New busi- ness model solutions such as Uber, Lyft, and Maven, have come to gain signifi- cant market share. They put to test the traditional vehicle ownership and provide alternatives for congested urban areas. As autonomous vehicles are gaining ground, companies will further widen the integrated set of mobility options and services they are offering. They will 271 connect the self-driving cars with other modes of transportation to provide cus- tomers with improved services of seamless intermodal transportation. They will strive to ensure easy access, smooth payment process and rich entertainment ex- perience. The mobility system will have to provide customers with trip planning, route adjustment, seamless connectivity to infrastructure and vendors. Social net- works would take on an expanded role by suggesting customer preferences to make the journey most pleasurable. These functionalities will have to be handled by sophisticated electronic components and software applications. Technology is the driving force behind this wide scope change. Technology companies will have to adapt to creating and operating larger and more complex information networks. Artificial intelligence and deep learning [3] will minimize human error and facilitate management of huge amounts of data. These com- panies will enable new environments and create the landscape of new digital communities. The security aspect of the software these companies will provide is of paramount importance for their viability. Security must be embedded in every stage of the product development process both in hardware devices and the software algorithms. Suppliers are facing a dynamic, fast shift to fully digital connectivity with seamless flow of data between cars, infrastructure, and mobile devices. The connected vehicle ecosystem will bring the greatest challenges to cy- bersecurity specialists. Today the deepest fears and concerns for cyberattacks are related to in-vehicle systems. These concerns would most likely not be the preva- lent ones we head into the autonomous future. The extent of economic and human life damages if a malicious attack were successful on connected vehicles could be of catastrophic proportion. The connected world of computing is prevalent in our modern society with connected vehicles as part of this ecosystem. Connectivity between devices and wearables, IoT sensors, smartphones, tablets, laptops, per- sonal robotics, smart cars, and smart cities has become the new paradigm. Con- nected world research firm GSMA estimates that 100% of cars will be connected to a cellular network by 2025 [2]. Connected cars are storming into our everyday life loaded with new tech- nologies and devices that perform the new functions. It brings along computing demand challenges. The devices already installed in the car and the infrastructure around are becoming platforms for enhanced safety features, advertising, enter- tainment, and social networking. They also become attack vectors for malicious intruders and need to be protected. 1.2 Mobility management Supplier sourcing of materials and parts, building customized automobiles, integration with insurance, regulatory, and financial services, will require enhanced 272 level component intelligent systems for connectivity and data exchange. With it come the challenges of securing the data flow, protecting the information, and not allowing malicious disruptions. Content component suppliers, service providers, advertisers, entertainment, and social media industries will use this new forum to reach the customers and provide customized services that are immersive and interactive. The in-vehicle transit experience will bring new challenges and opportunities. Automobile sen- sors and personal devices will be transferring greater and greater data loads. Their data collection will be producing information about customer experiences and directing targeted advertising and service options. Supplier community will be providing components to meet the automo- tive as well as infrastructure demands. Intermodal transportation will be made possible by integrated computer technology systems. As society is moving to a more integrated set of mobility services, the digital infrastructure supporting the physical infrastructure will have a critical role. Roads, waterways, bridges, park- ing structures will again take their vital part in this interconnected environment. Cloud computing, Internet of Things, Operating systems, and Cybersecurity are growing in importance and will be of paramount significance for the safety and security of people. Cybersecurity and electronic device suppliers will be challenged with the scope and complexity of these systems. The magnitude of these changes requires adequate foresight and preparation to ensure the systems are protected for integri- ty, confidentiality, and availability. The security risk would involve large systems and can spread at higher speed than ever. The consequences can be detrimental and encompass not just individuals but states and the global community. Technology companies are the top contributors of patents in the automo- tive space and not the automotive companies themselves. With the acceleration in automated driving technologies, several automotive companies have entered into joint ventures with technology companies to develop self-driving cars like General Motors and Cruise, Ford, and Argo AI. BMW and Daimler formed a partnership to develop autonomous vehicles. Suppliers on the other hand are forming a unique network of highly special- ized providers. The complex requirements and ever shifting market demand force these companies to go fast and invent new ways to make features functional. Highest demand suppliers are in the following areas: Biometrics, ADAS and Au- tonomous, Infotainment, and Telematics. 1.3 IoT (Internet of Things) IoT would multiply the effect of a malicious intrusion to a devastating widespread catastrophe. IoT is adding to the complexity of the problem. Communications 273 over the wireless medium pose security threats that are yet to be fully understood. With the advent of sophisticated cognitive radios, wireless devices, drones, small satellites, driverless cars, and wireless healthcare devices, security threats to wireless mobile communications systems are rapidly increasing. As 5G and other newly developed systems are deployed, a new wave of protective methods and policies are needed. The level of complexity of wireless systems creates a wider attach surface with multiple potential points of failure. A workshop was held by the Networking and Information Technology Research and Development (NITRD) Program’s Wireless Spectrum Research and Development (WSRD) Interagency Working Group (IWG), which is co-chaired by the National Science Foundation (NSF) and the National Telecommunications and Information Administration (NTIA) - Security from a Wireless Spectrum Perspective: Technology Innovation and Policy Research Needs, on September 13, 2018, in Washington, DC [4]. The goal was to create connections and contacts between Federal agencies and between public and academic specialists to talk about wireless mobile devices cybersecurity. There were thirty-five workshop participants who represented stakeholders with a vested interest in the topic of research. The damage magnitude inflicted on the connected ecosystem is much greater than if it were localized to one individual vehicle of the ecosystem. The lure of penetrating the ecosystem is ever so high which makes targeting human weak- nesses more prevalent. Social engineering methods could potentially be exploited for easier entry into the car system during diagnostics or OTA (Over the Air) up- dates. Consequences then would be spread among the wider fleet. The work force performing these tasks would be a lucrative group for malicious hackers to study them and employ methods to beguile them. Another challenge of significant magnitude is the lack of knowledge and insufficient training of employees and personal users with these new challenging components and technologies. Social engineering techniques such as shoulder surfing, impersonation, false alarm, just to name a few, can occur in a shared vehicle. This vehicle, if penetrated, can become a node spreading malware or extracting personal information. It can become the originator of a system wide havoc and malfunction. The connected world of computing is prevalent in our modern society with connected vehicles as part of this ecosystem. Connectivity between devices and wearables, IoT sensors, smartphones, tablets, laptops, personal robotics, smart cars, and smart cities has become the new paradigm. The devices already in- stalled in the car and the infrastructure around are becoming platforms for en- hanced safety features, advertising, entertainment, and social networking. They also become attack vectors for malicious intruders and need to be protected. A complex web of suppliers, manufacturers, and service providers has emerged due to the interconnection of IoT systems and infrastructure. IoT is an 274 intricate and dynamic ecosystem. It includes numerous hardware components and systems in various electric architecture layouts. As more and more features are being introduced to meet customer demands, the complexity of these systems has escalated to an unprecedented level. IoT supply chain has a paramount influence on security. The SCRM (supply chain risk management) for the information and communication technology is essential in conquering the challenges stemming from the IoT wide-spread domi- nance. Although it does act as a useful guideline, it may not be sufficient to tackle the more complex nature of IoT networks and the associated supply chain [5]. The various ownership and decentralized control are another point of con- cern. A network administrator over the complete device ecosystem does not exist and therefore there is limited control over the network. The administrators may not even have a complete understanding of all the connected devices and their inter-operability. The IoT ecosystem and its security is significantly different from the estab- lished ICS (information and communication systems). There are many different parties participating in a system with no regulations. Services are mainly inter- connected thus opening the door for multitude of specific applications. There is no industry standard to use a particular protocol for the IoT ecosystem. This complicates successfully embedding security as part of the code. The connectiv- ity nature of the IoT creates security challenges and new attack vectors. There are some significant differences between IoT systems and the established informa- tion systems. The IoT devices interact with the physical world by using actuation functionality as opposed to conventional mobile and computing systems. Conse- quences, compared to ICT systems, may be detrimental to human safety, make equipment inoperable, or cause operational interruptions. The complete access and management functionalities may not be built into the IoT devices [5]. These devices are mainly constructed as low power and with limited data processing capabilities. The security and privacy specifications for operating IoT devices may differ significantly from the mainstream ICT systems in the way they handle authentication and access control security. 2 Problem statement – supplier cybersecurity issues Risks in the automotive software supply chain as well as those associated with hardware components have escalated with the fast advent of autonomous mobility and the new connectivity paradigm. Automotive manufacturers procure electronic components from a supply chain of hundreds of vendors. The most pronounced risk of all is whether the tier supplier has built-in cybersecurity protection appropriately into their products. When OEMs put together the specifications, the level of the requirements is generic enough so that suppliers can innovate. In addition, not all constraints are known and understood at the time the supplier 275 is brought on board. When innovation and new concept development is taking place, requirements are generated on the go. That makes it hard to align with overall industry recommendations and procedures as it is not always possible to follow those. It is even harder to capture those requirements as lessons learnt after the product development phase. Competitive pressures further complicate any sharing or communization between suppliers. In addition, the timeframe of getting a component to market is incredibly compressed and does not follow normal mature product progression. Assessing the compound risk of various supply chain vendors is one of the pressing and compelling challenges with automotive component and software pro- viders. Best practice for suppliers to minimize risk would be to follow a structured approach according to industry recommendations. Cybersecurity must be embed- ded in the product development life cycle from the very initiation. That is not al- ways the case and there is no consistency among suppliers in doing that. The com- plexity comes from the large number of tiered suppliers and compressed timing. A Study of Automotive Industry Cybersecurity Practices, Supply Chain and Third-Party Component Challenges was performed jointly commissioned by SAE (Society of Automotive Engineers) and Synopsys [6]. Seventy-three (73%) percent of respondents are very concerned about the cybersecurity posture of automotive technologies supplied by third parties (Fig 1). Sixty-eight (68%) per- cent are also very concerned about the cybersecurity posture of the industry as a whole. Only forty-four (44%) percent say their organizations impose cybersecu- rity requirements for products provided by upstream suppliers [6]. Fig. 1. SAE, Securing the Modern Vehicle: A Study of Automotive Industry Cybersecurity Practices [6]. Secure coding training has not been brought up in priority. Only thirty-three (33%) percent of participants state that their companies train developers to prac- tice secure coding. The disparate manner in which new technology devices are 276 developed opens suppliers to vulnerabilities. Quality issues and cybersecurity attack vectors are often the result of the integration of 3rd party components, software, and applications. Survey results also revealed the supplier’s exposure to risk. Nineteen (19%) percent of respondents said they did not perform sufficient security testing dur- ing the creation of requirements and the design phase, and only twenty-eight (28%) percent said that development and testing was rigorously enforced [6]. It is notable that testing and validation are performed too late in the process. For the majority of participants, testing happens after product is released, which can incur massive increase cost to the organization. The goal should be to enable sup- pliers in their security and vulnerability process improvements and do that from the initiation of a product development cycle. If we enabled suppliers to improve cyber security testing and vulnerability management early through the supply chain, we would get a much better result [6]. Cybersecurity should not be looked upon as a burdensome overhead and ad- dressed at the end of the product cycle. Instead, it should become a constituent in every stage of the engineering process creation and be a guiding principle for every department that is involved. Automotive companies can employ numer- ous solutions from other industries by following their example of best practices and standards implementation. This rigorous approach to cybersecurity is vital to achieve enhanced safety while ensuring security, quality, and rapid time to mar- ket [6], [7], [8], [9], [10]. 3 Supplier risk assessment methodology composition The base methodology used is the FAIR (Factor Analysis of Information Risk) approach. It provides a solid foundation for risk assessment and quantification of results and a bottom-up approach of managing risk and operational supplier readiness [11]. The methodology comprises of steps that allow mapping the attributes on a component level, sub-system level, and finally on a system or enterprise level. This approach addresses supplier issues and leads to the development of policies and procedures to control the risks. A risk assessment methodology is essential in defining the weaknesses in the supplier process. The issues laid out can be addressed and mitigated by a concerted effort by the most prominent industry suppliers to implement stringent common processes in the early phases of product development. It will include collaboratively working with suppliers to identify and classify the weaknesses in the engineering design, define security requirements along with the technical requirements, and institute policies. In Fig. 2, it is schematically shown how can be chosen to procure several components based on their security posture and competitive characteristics. 277 Fig. 2. Supplier choice to procure components based on cybersecurity posture. The risk assessment building blocks consist of establishing the strategic and procedural approach of a supplier to cybersecurity. It should comprehend process steps such as forming a cross functional team, identifying risks and their attrib- utes, filtering, assessing, prioritizing risks, analyzing results, and constructing an actionable mitigation strategy. As the company Vector laid it out, the V model is now in wide use among the automotive communities. The V model calls for a co- ordinated process between functional safety and cybersecurity. Starting with item definition, then threat and risk assessment in both fields, followed by defining of the cybersecurity and safety goals, concept, and requirements. The next stage starts with verification on a component level, then on a system level, followed by validation, pen testing, approval for release, and finally production, maintenance, and decommissioning. A cybersecurity assessment methodology should verify there is a manage- ment process in place to ensure cybersecurity is part of the fabric of the product development cycle. It should acknowledge if there is a cybersecurity develop- ment team, plans developed, requirements followed, tests performed, reports produced. This approach proves a structured cybersecurity plan in place and ac- knowledges the degree of cybersecurity achieved by the supplier. Suppliers should demonstrate their continuous cybersecurity activities such as cybersecurity monitoring, event assessment, and vulnerability analysis throughout the products development phases, starting with the concept phase, then the product development phase, followed by cybersecurity validation, pro- duction, and operations maintenance, all the way to decommissioning. 278 The methodology acknowledges a systemic Threat and Risk Assessment (TARA) activities of the supplier. They should include asset identification, threat scenario identification, impact rating, attack path analysis, attack feasibility rat- ing, risk determination, and mitigation strategy. This approach is part of the new standard ISO/SAE 21434. Assigning a risk value and attack feasibility rating should be at the basis of the cybersecurity supplier assessment as recommended by this standard. CAL is the risk value of CAL1 through CAL4, Attack Feasibil- ity Rating would range from Very Low to High, resulting in an impact rating of Negligible, Moderate, Major, or Severe. Adequate process measures need to be in place to respond to those risks to ensure minimizing the time, financial and image damage to the organization. The proposed methodology assigns dollar value to the supplier risk level and facilitates executive ranks in making adequate investment decisions. The dollar value can be calculated on the basis of tangible and intangible factors. Lost time of production or delivery is one factor that can be quantified. This factor can be assigned dollar amount based on historical quality standards adherence data for the company. On a functional level, Monte Carlo analysis can be utilized to simu- late attack vectors and the loss function of those attacks. The risk assessment methodology relies on historical data, yet breaches are not 100% predictable. Malicious agents continuously change their practices and come up with new ways to attack. Depth in defense, employing several measures and adhering to a rigorous process is the best approach to successful cyberse- curity management. Functional safety, cybersecurity, and homologation aspects demonstrated in a risk assessment model would be a proof of supplier process maturity and consequently be reflected in the supplier cybersecurity rating. Cybersecurity risk should not be looked at in isolation. Recommendations from the latest draft of ISO/SAE 21434 standard, along with ISO 26262, ISO 21448, and SAE J3061 need to be reflected in the assessment process. On an enterprise level, a high- level risk map needs to be created to outline the threat landscape. This approach should include identification and analysis of the sourc- es of attack and plotting them on the map of acceptable and unacceptable risks. The risk map needs to be looked at holistically, comprehending external events along with cybersecurity threats and their interdependencies. In the recent years, cybersecurity threats have moved from acceptable risk to high-risk quadrant of the risk scale. This calls for enforced measures to detect and mitigate risks. On an organizational level, management needs to determine the tolerable level of risks they are willing to take. This proposed methodology will facilitate converting the level of risk into the dollar amount a company can tolerate and establish a risk curve of loss exceedance. This curve will reflect the risk suppliers are bringing to the organization from outside. Risk should be estimated as a compound value, either complementary or independent, depending on the characteristics of the 279 organization. Some intangible values can also be considered as part of the overall risk. Trust, established between a company and a supplier, can participate in the equation as a Trust Value. On an enterprise level, the Loss Exceedance probabil- ity would translate into a dollar amount that senior management can determine if tolerable or not. The compound risk can also be estimated by breaking down the cyberse- curity services into four main areas to further establish where the greatest vul- nerability impact may lie. These areas are Edge Security like secure gateways, Vehicle Computer Security of systems and connectivity, Access and Communica- tion Security like authentication, or Services Security like threat intelligence and emergency responses. These areas can be separately rated and allocated a security risk. This approach can help an organization enhance processes and mitigation strategies for a particular security partition as well as focus more resources to it. 4 Conclusion The proposed risk assessment methodology addresses the burning issues associated with supply chain management of cybersecurity risk. The automotive industry is going through a dramatic change on its way of embracing automated driving, IoT, cloud data, and artificial intelligence. The new paradigms require in depth analysis of risk. The multilayer supply chain exhibits complex issues stemming from various levels of technological development, internal procedures and processes, market demands, and cost structure. OEMs will need to make informed decisions on which suppliers to bring on board and how reliable these suppliers are to deliver just in time quality products. The innovative approach of the proposed risk assessment methodology al- lows OEMs to calculate compound cybersecurity risk at all tiers, then assess this compound risk as part of the overall enterprise risk. Its significance lies in its applicability to industry demands. Requirements are derived from the very initia- tion of the product development process. These requirements are then embedded in the risk assessment tool and tracked periodically throughout the life of the product. The challenges associated with this methodology lie in the quality of the his- toric risk data used for assessment, the truthfulness of supplier disclosure, and the unpredictability of future threats. These three aspects need to be further explored, analyzed, and structured as a reliable basis for evaluation. Industry level awareness of the importance of cybersecurity posture are lay- ing the ground for supplier inclusiveness. It is in the interest of individual vendors to demonstrate cybersecurity posture in order to be considered by OEMs. Failure of responsibility, although generally allotted to OEMs, has on many occasions been attributed to an individual supplier, leading to an image detriment as well as 280 severe consequences such as bankruptcy. Brining suppliers to a common level of cybersecurity requirements and disclosure is of paramount importance for both OEM and supplier product acceptance and organizational longevity. Guided by the common goal of ensuring customer safety and security, OEMs and suppliers can address cybersecurity issues as a coalition, embracing a common risk assess- ment methodology as the one proposed in this paper. The value of this proposal can be summarized as providing a unique meth- odology that evaluates risk of a supplier tier tree. The methodology is essential in defining the weaknesses in the supplier process. It offers a structure that can be applied to suppliers on a global scale. OEMs can require the same set of require- ments and procedures when quoting a commodity to several suppliers. Awareness of the potential financial impact on the organization is a foundation for sound business decisions. References 1. Navigant Research, http://smarttransport.solutions/2018/05/29/consumer-impacts/he Automo- bile, last accessed 2021/03/30. 2. Swan, M.: Connected Car: Quantified Self Becomes Quantified Car. Journal of Sensor and Actuator Networks 4(1), 2-29 (2015). 3. Tsankova, P., Momcheva, G.: Sentiment detection with FedMD: Federated learning via model distillation. In: Dimitrov, V., Georgiev, V. (eds.) ISGT 2020, CEUR Workshop Proceedings, vol. 2656, pp. 236–247 (2020). 4. EInfochips Homepage, https://www.einfochips.com/blog/role-of-edge-computing-in- connected-and-autonomous-vehicles/, last accessed 2021/03/30. 5. Farooq, M. and Zhu, Q.: IoT Supply Chain Security: Overview, Challenges, and the Road Ahead. arXiv:1908.07828v1 [cs.CR], (2019). 6. SAE Homepage, https://www.sae.org/binaries/content/assets/cm/content/topics/cybersecurity/ securing_the_modern_vehicle.pdf, last accessed 2021/03/30. 7. Spasova, V.: Software Quality ISO Standards. In: 4th International Proceedings on Interna- tional Congress Mechanical Engineering Technologies MT’04, pp. 1–6. Scientific Notices of the Scientific and Technical Union of Mechanical Engineering: Collection of Reports, Sofia, Bulgaria (2004). 8. Bakardjieva, T., Gercheva, G.: Knowledge management and e-learning - An agent-based ap- proach. World Academy of Science, Engineering and Technology 76, 663–666 (2011). 9. Spasova, V.: Standards for Quality Management in the Software Business, University Publish- ing House of VFU “Chernorizets Hrabar”, Varna, Bulgaria (2019). 10. Gradinarova, B., Bakardjieva, T., Gradinarova, M.: Some aspects of application of software agents in information retrieval in virtual-based educational environments. IFIP International Federation for Information Processing 210, 315–319 (2006). 11. Jones, J.: An introduction to factor analysis of information risk (FAIR). Norwich Journal of Information Assurance 2(1), 67 (2006). 281