Hero image for FAIR Analysis: Factor Analysis of Information Risk

FAIR Analysis: Factor Analysis of Information Risk

PC Drama
123 views

The FAIR (Factor Analysis of Information Risk) model is the international standard for quantifying cyber risk in financial terms. Instead of red/yellow/green heat maps, FAIR gives security leaders a defensible, dollar-denominated way to communicate risk to the board.

How FAIR Works

FAIR decomposes risk into two measurable dimensions:

  • Loss Event Frequency (LEF) — How often a loss event is expected to occur. This combines Threat Event Frequency (how often threats act) and Vulnerability (the probability an action results in loss).
  • Loss Magnitude (LM) — The financial impact when a loss occurs. Split into Primary Loss (direct costs) and Secondary Loss (stakeholder reactions like lawsuits, fines, reputation damage).

The formula: Risk = LEF × LM, producing an annualized dollar figure — your Annual Loss Expectancy (ALE).

The Six Forms of Loss

Every cyber incident maps to one or more of FAIR's six loss categories, split across primary (direct) and secondary (stakeholder reaction) impacts:

TypeCategoryDescription
Primary (Direct)ProductivityOperational inability to deliver products or services
Primary (Direct)ResponseCosts of managing the incident (IR teams, forensics, comms)
Primary (Direct)ReplacementReplacing or restoring damaged capital assets
Secondary (Reactions)Fines & JudgmentsRegulatory penalties, lawsuits, contractual penalties
Secondary (Reactions)Competitive AdvantageLoss of IP, trade secrets, or market differentiators
Secondary (Reactions)ReputationDecreased stakeholder confidence, customer churn, stock impact

Source: FAIR Institute

FAIR Cyber Risk Scenario Taxonomy

The FAIR CRM Scenario Taxonomy (February 2025) provides a standardized way to define risk scenarios using four elements. Each scenario follows the structure: "[Threat] impacts [Asset] via [Method], causing [Effect]."

Expand each section to explore the taxonomy:

Threats — Who Causes Harm
Threat ActorIntentDescription
Cyber CriminalsMaliciousFinancially motivated groups operating ransomware, fraud, and data theft operations
Nation-StateMaliciousGovernment-sponsored actors conducting espionage, sabotage, or strategic disruption
Privileged InsiderBothEmployees or contractors with elevated access who misuse it deliberately or accidentally
Non Privileged InsiderBothStandard users who cause harm through mistakes, social engineering, or low-level abuse
AI AgentsBothAutonomous systems that cause harm through adversarial manipulation or unintended behavior
HacktivistsMaliciousIdeologically motivated attackers targeting organizations for political or social causes
Cyber TerroristsMaliciousActors seeking to cause fear, disruption, or physical harm through cyber means
Script KiddiesMaliciousLow-skill attackers using pre-built tools and exploits opportunistically
Competitor DrivenMaliciousRivals conducting corporate espionage, IP theft, or competitive sabotage
Sabotage ActorsMaliciousIndividuals or groups intent on destroying systems, data, or operational capability
Assets — What Is at Risk
Asset CategoryExamples
Sensitive Personal DataPII, PHI, financial records, biometric data
IP & Trade SecretsSource code, formulas, proprietary algorithms, R&D data
Co-Owned Proprietary DataJoint venture data, shared datasets, partner integrations
Confidential Business InformationStrategic plans, M&A data, internal financials, legal communications
Revenue-Generating ProcessE-commerce platforms, SaaS applications, payment processing
Third-Party Revenue ProcessClient-facing services, managed platforms, outsourced operations
Cost-Generating ProcessManufacturing systems, logistics, internal IT infrastructure
Product or ServiceSoftware products, APIs, digital services customers rely on
Cash or Cash EquivalentBank accounts, cryptocurrency wallets, payment instruments
Physical Assets & FacilitiesData centers, OT/ICS systems, IoT devices, office infrastructure
Methods — How Attacks Happen
Attack MethodDescription
Ransomware + ExfiltrationEncrypts systems and steals data for double extortion leverage
Ransomware (Encryption Only)Locks systems without data theft, pressuring victims to pay for decryption
Data ExfiltrationUnauthorized extraction of sensitive data without encrypting systems
DDoSOverwhelms infrastructure to cause service outages
CryptominingHijacks compute resources for unauthorized cryptocurrency mining
Account TakeoverCompromises user or admin accounts to impersonate legitimate users
MalwareDeploys trojans, worms, or spyware for persistence and control
System OutageCauses operational disruption through destructive attacks or misconfiguration
Data CorruptionAlters or destroys data integrity without necessarily exfiltrating it
Data LeakageUnintentional exposure through misconfiguration, oversharing, or poor access controls

Initial Attack Vectors

VectorDescription
PhishingSocial engineering via email, SMS, or voice to trick users into granting access
SIM SwappingHijacks phone numbers to bypass SMS-based MFA
Deepfake AttacksAI-generated audio or video used to impersonate executives or authorize transactions
External App ExploitationTargets vulnerabilities in internet-facing applications (CVEs, zero-days)
Credential StuffingAutomated login attempts using breached username/password pairs
Physical AccessOn-site intrusion to install implants, steal hardware, or access terminals
USB Drop AttacksMalicious USB devices planted to exploit auto-run or curious employees
ML Model EvasionAdversarial inputs designed to fool machine learning classifiers
Man-in-the-MiddleIntercepts and potentially alters communication between two parties
Supply ChainCompromises a vendor, library, or update mechanism to reach downstream targets
Remote Service ExploitationAttacks exposed RDP, VPN, SSH, or other remote access services
BruteforceSystematic password guessing against authentication endpoints
Privileged AbuseLegitimate access misused by insiders for unauthorized purposes
LLM Prompt InjectionManipulates AI language models to bypass safety controls or exfiltrate data
Training Data PoisoningCorrupts ML training data to degrade model accuracy or introduce backdoors
Effects — Business Impact
EffectTypeDescription
Information Privacy LossPrimaryExposure of personal or regulated data triggering notification and compliance obligations
Proprietary Data LossPrimaryTheft or destruction of trade secrets, source code, or competitive intelligence
Business InterruptionPrimaryOperational downtime that prevents revenue generation or service delivery
Cyber ExtortionPrimaryRansom demands tied to encrypted systems, stolen data, or threatened disclosure
Network SecurityPrimaryCompromise of network integrity enabling lateral movement or persistent access
Financial FraudSecondaryUnauthorized transactions, BEC wire transfers, or payment diversion
Media FraudSecondaryManipulation of public communications, fake press releases, or brand impersonation
Hardware BrickingSecondaryPermanent destruction of firmware or hardware requiring full replacement
Post Breach IncidentsSecondaryFollow-on attacks exploiting data or access gained in the initial breach
Reputation DamageSecondaryLoss of customer trust, stock price decline, and stakeholder confidence erosion

Example Scenario

Using the taxonomy structure: "Cybercriminals impact customer data via ransomware, causing data breach, business interruption, and regulatory action."

This scenario can then be quantified using FAIR: estimate the frequency (LEF) and the financial impact across all six forms of loss (LM) to produce a defensible ALE figure for your budget justification.

Learn More

The FAIR model is maintained by the FAIR Institute and standardized as Open FAIR by The Open Group. The complete CRM Scenario Taxonomy is available to FAIR Institute members.