Blog / Framework & Concepts

Understanding Cyber Threats: A Common Language

Why cybersecurity has a language problem, and how TLCTC's 10 non-overlapping clusters bridge the gap between causes and consequences.

BK
Bernhard Kreinz
Loading read time...
Abstract

Cybersecurity has a language problem. We use "threat" to mean a dozen different things. This isn't just semantics; it blocks effective risk management. TLCTC provides a universal solution.

Audio Insights Deep Dive Series

The First Strictly Causal Cyber Threat Model

Explaining the Scope In 94 Seconds.

0:00 0:00
Speaker TLCTC Framework Lead
Illustration depicting the integration on Board Room Level.
Watch the critical CEO asking the right questions: Establishing a common language with the board.

The Problem

Cybersecurity has a language problem.

We use "threat" to mean a dozen different things: the attacker, the vulnerability, the malware, the breach, the ransomware demand. When a CISO briefs the board, when a SOC analyst writes an incident report, when a vendor sells a solution—they're often using the same words to describe fundamentally different things.

This isn't just semantics. It means we can't compare incidents. We can't aggregate threat intelligence cleanly. We can't map controls to threats with confidence. And we can't communicate risk consistently across teams.

The Solution

TLCTC (Top Level Cyber Threat Clusters) is a cause-oriented taxonomy that classifies cyber attacks by how they happen—the generic vulnerability they exploit—not by who's attacking, what tools they use, or what the outcome is.

Ten clusters. Non-overlapping. Universal across any technology environment.

Executive Summary
#Cluster What It Means
#1 Abuse of Functions
Misusing legitimate features—no code flaw required
#2 Exploiting Server
Triggering a bug in software that accepts requests
#3 Exploiting Client
Triggering a bug in software that consumes content
#4 Identity Theft
Using someone else's credentials to authenticate
#5 Man in the Middle
Intercepting or manipulating communications in transit
#6 Flooding Attack
Overwhelming capacity to cause disruption
#7 Malware Execution
Executing foreign code through normal execution paths
#8 Physical Attack
Unauthorized physical access or interference
#9 Social Engineering
Manipulating humans into acting against security
#10 Supply Chain Attack
Exploiting trusted third-party relationships

Why This Matters

Ransomware isn't a threat category—it's an outcome.

When we say "ransomware attack," we're describing the result (encrypted files, extortion demand) and maybe the tool. But the actual threat path might look like this:

Attack Path Example
#9 Social Engineering → #7 Malware → #4 Identity Theft → (#1 Abuse of Functions + #7 Malware)
→ [Data Encryption - Loss of Availablility]

A phishing email tricks someone into running malware. The malware harvests credentials. Those credentials access legitimate admin tools. Data gets encrypted.

Each step exploits a different generic vulnerability. Each step has different controls. Calling the whole thing "a ransomware attack" obscures what actually happened—and what could have stopped it.

TLCTC gives you the grammar to describe this precisely.

The Key Insight: Causes vs. Consequences

TLCTC is built on the Bow-Tie risk model, which enforces a strict separation:

  • Left side (causes): How did the attacker get in? → TLCTC clusters live here
  • Center: Loss of Control—the moment the attacker succeeds
  • Right side (consequences): What happened next? → Data breach, service outage, fraud

This separation matters because:

  • The same threat path can lead to different consequences
  • The same consequence can result from different threat paths
  • Controls on the cause side prevent; controls on the consequence side contain

When you conflate cause and effect, you can't reason clearly about either.

What You Can Do With It

  • Compare incidents — Express any intrusion as a chain of cluster steps, making incidents directly comparable regardless of technology or sector.
  • Map controls precisely — Each cluster represents a distinct attack surface. Map your controls to specific clusters instead of vague threat categories.
  • Measure what matters — Track attack velocity (how fast attackers move between steps) against your detection speed. Know where you're structurally too slow.
  • Communicate clearly — Give leadership, risk, and technical teams a shared vocabulary that means the same thing to everyone.

Go Deeper

TLCTC v2.0 includes:

  • Ten foundational axioms that constrain interpretation and ensure consistent classification
  • Classification rules (R-Rules) for handling common ambiguities
  • Attack Path notation with velocity (Δt) and topology dimensions
  • Control framework integration mapping clusters to NIST CSF functions
  • Machine-readable JSON schemas for automation and tooling
Enlarge Comic
Supply Chain vs 3rd Party Risk
From the Strategic Blog: Understanding the boundary: #10 (Inbound Code) vs. 3rd Party Risk (Outbound Data).

TLCTC is designed to be a translation layer—connecting risk management, security operations, and executive communication through a shared, precise language for cyber threats.