SlideShare a Scribd company logo
1 of 59
Risk Analysis for Dummies Presented by Nick Leghorn
Credentials B.S., Security and Risk AnalysisThe Pennsylvania State University Risk Analyst for a government contractor NSA Certified INFOSEC Professional Speaker at The Last HOPE:“The NYC Taxi System: Privacy Vs. Utility”
This talk is for… IT Professionals Penetration testers Network security folk Anyone who needs to explain “risk”
WARNING The risk analysis process depends on the imagination,creativity and integrity of the individuals doing the analysis. The mere application of these techniques without appropriately talented staff does not ensure a proper and thorough risk analysis product.
NOTICE The data, charts and information contained within this presentation are completely notional and do not represent any real data. No sensitive or otherwise classified information is contained within this presentation. FBI, please don’t arrest me.
The Story of Nate and Cliff
What is “Risk”? Seriously. There are microphones, use them!
What is “Risk”? Any uncertainty about the future Technically can be both positive and negative Security questions focus only on negative outcomes
The Six Questions of Risk Management Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
The Risk Equation probability of an outcome given that event  is the combination of probability of an event the value of that event and outcome pair Risk For every event and outcome
Scope Scope  protector threat asset is the set of
Scope Asset Something which provides a benefit to the possessor Something which the protector is charged with safekeeping Protector The entity charged with safekeeping of the asset An entity where the loss of the asset would be harmful Threat An entity with the desire to deny the asset to the protector A force which could destroy, disrupt, or otherwise harm the asset
For Nate and Cliff… Protector: Nate and the NOC Threat: “Hackers” Asset: Company information
Back to the equation… Probability?
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip Heads Tails
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… The size of each “box” is the probability Strive for MECE Coin Flip Heads Tails Heads Tails Coin rolls away and is lost
“You must not say ‘never.’ That is a lazy slurring-over of the facts.  Actually, [risk analysis] predicts only probabilities.  A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)
Calculating probability Past data Events of concern / total events 3 successful attacks / 30,000 attempts                = 0.0001 probability “Binning your gut” Low, Medium, High
Remember: Probability must be calculated for BOTH Probability of an event Probability of an outcome GIVEN that the event has taken place
Why does “valuation” matter? Some events are more concerning than others Death in a car accident Death in a plane crash Value of the (e,o) pair can be monetary, time based, goodwill based, whatever is of most concern
The process
The process
The process
The process
The process
The process
The process
The process
The process
Method 1: The Simple Chart THIS IS NOT A “RISK MATRIX”!
Method 2: The Probabilistic Chart (Probability of event)*(Probability of outcome given event)
Method 3:  Annualized Loss Expectancy (Probability from last page)*(Loss from event)
Shortcuts and Methodologies
How to use a “Factor based Model” “Factor Based Models” provide a formula for quick and easy assessment of a range of items and rank ordering of them. WARNING: This system only provides a RELATIVE ranking of the items listed.
How to use a “Factor based Model” Assign a range of numbers to each factor Try to use even ranges of numbers (1-4) Ensure that the higher the number, the more it points towards whatever the issue at hand is Evaluate each factor using that range Add up the combined score
CARVER: Target Selection Criticality Accessibility Recoverability Vulnerability Effect  Recognizability
CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
EVIL DONE: Target Selection Exposed Vital Iconic Legitimate Destructible Occupied Near Easy
DSHARPP: Target Selection Demography Symbology History Accessibility Recuperability Population Proximity
CRAVED: Attractiveness of Assets Concealable Removable Available Valuable Enjoyable Disposable
MURDEROUS: Weapon Selection Multipurpose Undetectable Removable Destructive Enjoyable Reliable Obtainable Uncomplicated Safe
ESEER: Facilitation of crime Easy Safe Excusable Enticing Rewarding
HOPE: Ease of social engineering Hour of the day Oversight by manager Pressure Encouragement
Scales
Scales are IMPORTANT Let’s assume a FBM of: A+B+C+D A: 1-4 Vulnerability B: $ of damages C: Time to return to operation (Seconds) D: Lives lost For: Ships? Buildings? Troops?
Types of scales Nominal Binning, no order (apples, pears, oranges) Ordinal Hierarchical, no calculations (High, medium, low) Interval Hierarchy and calculations (1, 2, 4, 8, 16) Natural Interval with countable items (deaths, $, time)
Let’s bring this all together Nate’s presentation
Risk Analysis of Corporate Systems Presented by Nate
Attackers are attempting to penetrate our network to steal, destroy or alter corporate data NOC has been tasked with securing against these attacks Problem at Issue
Attacks over the last 3 years
Andrews Co. Victim of a penetration, customer data leaked Loss of revenue from loss of goodwill: $2.4M Revenue dedicated to fixing systems: $10M TNH Inc. Victim of a lengthy Denial of Service attack Loss of revenue from inability to do business: $30M Revenue dedicated to upgrading systems: $12M Effects of attacks on other companies
Implement an IDS Detects attacks $10,000 to install, $1,000/year in upkeep Tighten firewall Stops intruders $5,000 to install, $500/year in upkeep Install WEP at POS facilities Tightens security $10 in equipment & $5 in labor per facility ($10+$5)*50,000 = $750,000 No upkeep costs Recommendations
Cost benefit analysis As we can see by the above numbers, by spending 766,500 this year we can mitigate the possible effects of an attack  which (on average) will cost $15M. Thus, the loss will be approx. $14,233,500 less than without the recommended upgrades.
Annualized Loss Expectancy
The End (Of the presentation within a presentation)
Remember these? Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
Things to remember… Use common sense! If something looks wrong, it usually is Scope the question Don’t bite off more than you can chew Use proper scales Remember the 6 questions of risk FBMs are quick and easy, but be careful! Check your work! Academic integrity BEFORE making managers happy

More Related Content

What's hot

Operational risk & business continuity management
Operational risk & business continuity managementOperational risk & business continuity management
Operational risk & business continuity management
Ujjwal 'Shanu'
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 

What's hot (20)

Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Introduction to Open FAIR
Introduction to Open FAIRIntroduction to Open FAIR
Introduction to Open FAIR
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information RiskMeasuring DDoS Risk using FAIR (Factor Analysis of Information Risk
Measuring DDoS Risk using FAIR (Factor Analysis of Information Risk
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Risk management
Risk management Risk management
Risk management
 
Operational risk & business continuity management
Operational risk & business continuity managementOperational risk & business continuity management
Operational risk & business continuity management
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Crown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identificationCrown jewels risk assessment - Cost-effective risk identification
Crown jewels risk assessment - Cost-effective risk identification
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 

Similar to Risk Analysis for Dummies

Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
madlynplamondon
 
Risk Management Insight FAIR(FACTOR ANA
           Risk Management Insight       FAIR(FACTOR ANA           Risk Management Insight       FAIR(FACTOR ANA
Risk Management Insight FAIR(FACTOR ANA
troutmanboris
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
adkinspaige22
 
Risk Management Insight FAIR(FACTOR AN.docx
           Risk Management Insight        FAIR(FACTOR AN.docx           Risk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
boadverna
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
gertrudebellgrove
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
gertrudebellgrove
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
poulterbarbara
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
Faheem Ul Hasan
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
tarifarmarie
 

Similar to Risk Analysis for Dummies (20)

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Prof m02 v2
Prof m02 v2Prof m02 v2
Prof m02 v2
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
 
Risk Management Insight FAIR(FACTOR ANA
           Risk Management Insight       FAIR(FACTOR ANA           Risk Management Insight       FAIR(FACTOR ANA
Risk Management Insight FAIR(FACTOR ANA
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Insight FAIR(FACTOR AN.docx
           Risk Management Insight        FAIR(FACTOR AN.docx           Risk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Sect f41
Sect f41Sect f41
Sect f41
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Risk Analysis for Dummies

  • 1. Risk Analysis for Dummies Presented by Nick Leghorn
  • 2. Credentials B.S., Security and Risk AnalysisThe Pennsylvania State University Risk Analyst for a government contractor NSA Certified INFOSEC Professional Speaker at The Last HOPE:“The NYC Taxi System: Privacy Vs. Utility”
  • 3. This talk is for… IT Professionals Penetration testers Network security folk Anyone who needs to explain “risk”
  • 4. WARNING The risk analysis process depends on the imagination,creativity and integrity of the individuals doing the analysis. The mere application of these techniques without appropriately talented staff does not ensure a proper and thorough risk analysis product.
  • 5. NOTICE The data, charts and information contained within this presentation are completely notional and do not represent any real data. No sensitive or otherwise classified information is contained within this presentation. FBI, please don’t arrest me.
  • 6. The Story of Nate and Cliff
  • 7. What is “Risk”? Seriously. There are microphones, use them!
  • 8. What is “Risk”? Any uncertainty about the future Technically can be both positive and negative Security questions focus only on negative outcomes
  • 9. The Six Questions of Risk Management Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
  • 10. The Risk Equation probability of an outcome given that event is the combination of probability of an event the value of that event and outcome pair Risk For every event and outcome
  • 11. Scope Scope protector threat asset is the set of
  • 12. Scope Asset Something which provides a benefit to the possessor Something which the protector is charged with safekeeping Protector The entity charged with safekeeping of the asset An entity where the loss of the asset would be harmful Threat An entity with the desire to deny the asset to the protector A force which could destroy, disrupt, or otherwise harm the asset
  • 13. For Nate and Cliff… Protector: Nate and the NOC Threat: “Hackers” Asset: Company information
  • 14. Back to the equation… Probability?
  • 15. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip
  • 16. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip Heads Tails
  • 17. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… The size of each “box” is the probability Strive for MECE Coin Flip Heads Tails Heads Tails Coin rolls away and is lost
  • 18. “You must not say ‘never.’ That is a lazy slurring-over of the facts. Actually, [risk analysis] predicts only probabilities. A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)
  • 19. Calculating probability Past data Events of concern / total events 3 successful attacks / 30,000 attempts = 0.0001 probability “Binning your gut” Low, Medium, High
  • 20. Remember: Probability must be calculated for BOTH Probability of an event Probability of an outcome GIVEN that the event has taken place
  • 21. Why does “valuation” matter? Some events are more concerning than others Death in a car accident Death in a plane crash Value of the (e,o) pair can be monetary, time based, goodwill based, whatever is of most concern
  • 31. Method 1: The Simple Chart THIS IS NOT A “RISK MATRIX”!
  • 32. Method 2: The Probabilistic Chart (Probability of event)*(Probability of outcome given event)
  • 33. Method 3: Annualized Loss Expectancy (Probability from last page)*(Loss from event)
  • 35. How to use a “Factor based Model” “Factor Based Models” provide a formula for quick and easy assessment of a range of items and rank ordering of them. WARNING: This system only provides a RELATIVE ranking of the items listed.
  • 36. How to use a “Factor based Model” Assign a range of numbers to each factor Try to use even ranges of numbers (1-4) Ensure that the higher the number, the more it points towards whatever the issue at hand is Evaluate each factor using that range Add up the combined score
  • 37. CARVER: Target Selection Criticality Accessibility Recoverability Vulnerability Effect Recognizability
  • 38. CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
  • 39. CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
  • 40. EVIL DONE: Target Selection Exposed Vital Iconic Legitimate Destructible Occupied Near Easy
  • 41. DSHARPP: Target Selection Demography Symbology History Accessibility Recuperability Population Proximity
  • 42. CRAVED: Attractiveness of Assets Concealable Removable Available Valuable Enjoyable Disposable
  • 43. MURDEROUS: Weapon Selection Multipurpose Undetectable Removable Destructive Enjoyable Reliable Obtainable Uncomplicated Safe
  • 44. ESEER: Facilitation of crime Easy Safe Excusable Enticing Rewarding
  • 45. HOPE: Ease of social engineering Hour of the day Oversight by manager Pressure Encouragement
  • 47. Scales are IMPORTANT Let’s assume a FBM of: A+B+C+D A: 1-4 Vulnerability B: $ of damages C: Time to return to operation (Seconds) D: Lives lost For: Ships? Buildings? Troops?
  • 48. Types of scales Nominal Binning, no order (apples, pears, oranges) Ordinal Hierarchical, no calculations (High, medium, low) Interval Hierarchy and calculations (1, 2, 4, 8, 16) Natural Interval with countable items (deaths, $, time)
  • 49. Let’s bring this all together Nate’s presentation
  • 50. Risk Analysis of Corporate Systems Presented by Nate
  • 51. Attackers are attempting to penetrate our network to steal, destroy or alter corporate data NOC has been tasked with securing against these attacks Problem at Issue
  • 52. Attacks over the last 3 years
  • 53. Andrews Co. Victim of a penetration, customer data leaked Loss of revenue from loss of goodwill: $2.4M Revenue dedicated to fixing systems: $10M TNH Inc. Victim of a lengthy Denial of Service attack Loss of revenue from inability to do business: $30M Revenue dedicated to upgrading systems: $12M Effects of attacks on other companies
  • 54. Implement an IDS Detects attacks $10,000 to install, $1,000/year in upkeep Tighten firewall Stops intruders $5,000 to install, $500/year in upkeep Install WEP at POS facilities Tightens security $10 in equipment & $5 in labor per facility ($10+$5)*50,000 = $750,000 No upkeep costs Recommendations
  • 55. Cost benefit analysis As we can see by the above numbers, by spending 766,500 this year we can mitigate the possible effects of an attack which (on average) will cost $15M. Thus, the loss will be approx. $14,233,500 less than without the recommended upgrades.
  • 57. The End (Of the presentation within a presentation)
  • 58. Remember these? Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
  • 59. Things to remember… Use common sense! If something looks wrong, it usually is Scope the question Don’t bite off more than you can chew Use proper scales Remember the 6 questions of risk FBMs are quick and easy, but be careful! Check your work! Academic integrity BEFORE making managers happy
  • 60. Questions? Full presentation (including slides, resources, audio & video): Blog.NickLeghorn.com
  • 61. “You must not say ‘never.’ That is a lazy slurring-over of the facts. Actually, [risk analysis] predicts only probabilities. A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)