SlideShare a Scribd company logo
1 of 16
Risk Management Insight
FAIR
(FACTOR ANALYSIS OF INFORMATION RISK)
Basic Risk Assessment Guide
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
NOTE: Before using this assessment guide…
Using this guide effectively requires a solid understanding of
FAIR concepts
‣ As with any high-level analysis method, results can depend
upon variables that may not be accounted for at
this level of abstraction
‣ The loss magnitude scale described in this section is adjusted
for a specific organizational size and risk
capacity. Labels used in the scale (e.g., “Severe”, “Low”, etc.)
may need to be adjusted when analyzing
organizations of different sizes
‣ This process is a simplified, introductory version that may not
be appropriate for some analyses
Basic FAIR analysis is comprised of ten steps in four stages:
Stage 1 – Identify scenario components
1. Identify the asset at risk
2. Identify the threat community under consideration
Stage 2 – Evaluate Loss Event Frequency (LEF)
3. Estimate the probable Threat Event Frequency (TEF)
4. Estimate the Threat Capability (TCap)
5. Estimate Control strength (CS)
6. Derive Vulnerability (Vuln)
7. Derive Loss Event Frequency (LEF)
Stage 3 – Evaluate Probable Loss Magnitude (PLM)
8. Estimate worst-case loss
9. Estimate probable loss
Stage 4 – Derive and articulate Risk
10. Derive and articulate Risk
Risk
Loss Event
Frequency
Probable Loss
Magnitude
Threat Event
Frequency
Vulnerability
Contact Action
Control
Strength
Threat
Capability
Primary Loss
Factors
Secondary
Loss Factors
Asset Loss
Factors
Threat Loss
Factors
Organizational
Loss Factors
External Loss
Factors
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Stage 1 – Identify Scenario Components
Step 1 – Identify the Asset(s) at risk
In order to estimate the control and value characteristics within
a risk analysis, the analyst must first identify the asset
(object) under evaluation. If a multilevel analysis is being
performed, the analyst will need to identify and evaluate the
primary asset (object) at risk and all meta-objects that exist
between the primary asset and the threat community. This
guide is intended for use in simple, single level risk analysis,
and does not describe the additional steps required for a
multilevel analysis.
Asset(s) at risk:
_____________________________________________________
_
Step 2 – Identify the Threat Community
In order to estimate Threat Event Frequency (TEF) and Threat
Capability (TCap), a specific threat community must first be
identified. At minimum, when evaluating the risk associated
with malicious acts, the analyst has to decide whether the
threat community is human or malware, and internal or external.
In most circumstances, it’s appropriate to define the
threat community more specifically – e.g., network engineers,
cleaning crew, etc., and characterize the expected nature
of the community. This document does not include guidance in
how to perform broad-spectrum (i.e., multi-threat
community) analyses.
Threat community:
_____________________________________________________
_
Characterization
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Stage 2 – Evaluate Loss Event Frequency
Step 3 – Threat Event Frequency (TEF)
The probable frequency, within a given timeframe, that a threat
agent will act against an asset
Contributing factors: Contact Frequency, Probability of Action
Very High (VH) > 100 times per year
High (H) Between 10 and 100 times per year
Moderate (M) Between 1 and 10 times per year
Low (L) Between .1 and 1 times per year
Very Low (VL) < .1 times per year (less than once every ten
years)
Rationale
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Step 4 – Threat Capability (Tcap)
The probable level of force that a threat agent is capable of
applying against an asset
Contributing factors: Skill, Resources
Very High (VH) Top 2% when compared against the overall
threat population
High (H) Top 16% when compared against the overall threat
population
Moderate (M) Average skill and resources (between bottom 16%
and top 16%)
Low (L) Bottom 16% when compared against the overall threat
population
Very Low (VL) Bottom 2% when compared against the overall
threat population
Rationale
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Step 5 – Control strength (CS)
The expected effectiveness of controls, over a given timeframe,
as measured against a baseline
level of force
Contributing factors: Strength, Assurance
Very High (VH) Protects against all but the top 2% of an avg.
threat population
High (H) Protects against all but the top 16% of an avg. threat
population
Moderate (M) Protects against the average threat agent
Low (L) Only protects against bottom 16% of an avg. threat
population
Very Low (VL) Only protects against bottom 2% of an avg.
threat population
Rationale
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Step 6 – Vulnerability (Vuln)
The probability that an asset will be unable to resist the actions
of a threat agent
Tcap (from step 4):
CS (from step 5):
Vulnerability
VH VH VH VH H M
H VH VH H M L
Tcap M VH H M L VL
L H M L VL VL
VL M L VL VL VL
VL L M H VH
Control Strength
Vuln (from matrix above):
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Step 7 – Loss Event Frequency (LEF)
The probable frequency, within a given timeframe, that a threat
agent will inflict harm upon an
asset
TEF (from step 3):
Vuln (from step 6):
Loss Event Frequency
VH M H VH VH VH
H L M H H H
TEF M VL L M M M
L VL VL L L L
VL VL VL VL VL VL
VL L M H VH
Vulnerability
LEF (from matrix above):
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Stage 3 – Evaluate Probable Loss Magnitude
Step 8 – Estimate worst-case loss
Estimate worst-case magnitude using the following three steps:
‣ Determine the threat action that would most likely result in a
worst-case outcome
‣ Estimate the magnitude for each loss form associated with that
threat action
‣ “Sum” the loss form magnitudes
Loss Forms
Threat Actions Productivity Response Replacement
Fine/Judgments Comp. Adv. Reputation
Access
Misuse
Disclosure
Modification
Deny Access
Magnitude Range Low End Range High End
Severe (SV) $10,000,000 --
High (H) $1,000,000 $9,999,999
Significant (Sg) $100,000 $999,999
Moderate (M) $10,000 $99,999
Low (L) $1,000 $9,999
Very Low (VL) $0 $999
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Step 9 – Estimate probable loss
Estimate probable loss magnitude using the following three
steps:
‣ Identify the most likely threat community action(s)
‣ Evaluate the probable loss magnitude for each loss form
‣ “Sum” the magnitudes
Loss Forms
Threat Actions Productivity Response Replacement
Fine/Judgments Comp. Adv. Reputation
Access
Misuse
Disclosure
Modification
Deny Access
Magnitude Range Low End Range High End
Severe (SV) $10,000,000 --
High (H) $1,000,000 $9,999,999
Significant (Sg) $100,000 $999,999
Moderate (M) $10,000 $99,999
Low (L) $1,000 $9,999
Very Low (VL) $0 $999
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Stage 4 – Derive and Articulate Risk
Step 10 – Derive and Articulate Risk
The probable frequency and probable magnitude of future loss
Well-articulated risk analyses provide decision-makers with at
least two key pieces of information:
‣ The estimated loss event frequency (LEF), and
‣ The estimated probable loss magnitude (PLM)
This information can be conveyed through text, charts, or both.
In most circumstances, it’s advisable to also provide the
estimated high-end loss potential so that the decision-maker is
aware of what the worst-case scenario might look like.
Depending upon the scenario, additional specific information
may be warranted if, for example:
‣ Significant due diligence exposure exists
‣ Significant reputation, legal, or regulatory considerations exist
Risk
Severe H H C C C
High M H H C C
PLM Significant M M H H C
Moderate L M M H H
Low L L M M M
Very Low L L M M M
VL L M H VH
LEF
LEF (from step 7):
PLM (from step 9):
WCLM (from step 8):
Key Risk Level
C Critical
H High
M Medium
L Low
FAIR™ Basic Risk Assessment Guide
All Content Copyright Risk Management Insight, LLC
Running head: CLUB
CLUB
Goal and mission of the club; ways to achieve the mission and
goals.
The main goal of this club is to have the ability to enhance the
presence of group discussions in the school. There has been a
drastic drop in the performance of the students. Therefore this
group aims at elevating the levels at which students are reading.
There will include the implementation of several ways that the
student will be made to engage in reading. The first means that
the club will use is the application of groups. All the students
within the school will be allocated groups in which they will be
participating in discussions that will be geared at specific topics
after the groups have accomplished the necessary and desired
subject of study, they will have to present to the authorities.
These are the teachers. (Wieland, Biggs, Brockman, Johnson,
Meiers, Novotny, 2020).
Members of the club and the recruitment process.
The club will be made up of the best students from the faculties
in the school. I will use unique criteria to have the studies agree
to participate in the club. This will be through the use of
persuasion from the management team of the school. They will
convince the students that there will be additional benefits that
will come with them joining the clubs
What will happen at the meetings?
In the club, there will be meetings that will be carried out once
a week. The meeting s will aim to come up with a strategy that
will be used in the application of the ways that will be needed
to have the students form the study groups. (Anning, 2003)
What sort of events the club will hold.
Our club will hold several events, such as co-curricular
activities. These will help in the making of the learning
environment more enjoyable therefore help enhance the
studying process which mane students tent to find tiresome and
boring. The events will be organized twice per week (Allen,
1931).
Benefits
The club will have several benefits that will come by the
activities that the member will be associated with. The students
will learn the art of wrong as groups to achieve academic
excellence. Also, the students will learn much art, including
crafting, which will be among the taught activities in the events.
References
Allen, C. F. (1931). Initiating a School Club Program. Junior-
Senior High School Clearing House, 5(7), 389-394.
Anning, A. (2003). Pathways to the graphical club: The
crossroad of home and pre-school. Journal of Early Childhood
Literacy, 3(1), 5-35.
Repenning, A., Basawapatna, A., & Koh, K. H. (2009, May).
Making university education more like middle school computer
club: facilitating the flow of inspiration. In Proceedings of the
14th Western Canadian Conference on Computing
Education (pp. 9-16).
Wieland, M. L., Biggs, B. K., Brockman, T. A., Johnson, A.,
Meiers, S. J., Sim, L. A., ... & Novotny, P. J. (2020). Club Fit:
Development of a Physical Activity and Healthy Eating
Intervention at a Boys & Girls Club After School Program. The
Journal of Primary Prevention, 1-18.

More Related Content

Similar to Risk Management Insight FAIR(FACTOR AN.docx

Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...EC-Council
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessMuizz Anibire
 
Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis IMuizz Anibire
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk ManagementResolver Inc.
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoMatthewTennant613
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
HFMA Searching for Risk, April 2004
HFMA Searching for Risk, April 2004HFMA Searching for Risk, April 2004
HFMA Searching for Risk, April 2004Theim912
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxGraciaSuratos
 
world_vision-cva_-_risk_presentation.pptx
world_vision-cva_-_risk_presentation.pptxworld_vision-cva_-_risk_presentation.pptx
world_vision-cva_-_risk_presentation.pptxZainUlAbidinRana1
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk AssessmentTara Smith
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxcelenarouzie
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionMichel Rochette
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 

Similar to Risk Management Insight FAIR(FACTOR AN.docx (20)

OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment ProcessSession 02 Risk Assessment Program for YSP_The Risk Assessment Process
Session 02 Risk Assessment Program for YSP_The Risk Assessment Process
 
Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Session 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis ISession 04_Risk Assessment Program for YSP_Risk Analysis I
Session 04_Risk Assessment Program for YSP_Risk Analysis I
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Global Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health CoGlobal Health Comparison Grid TemplateGlobal Health Co
Global Health Comparison Grid TemplateGlobal Health Co
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
R af d
R af dR af d
R af d
 
HFMA Searching for Risk, April 2004
HFMA Searching for Risk, April 2004HFMA Searching for Risk, April 2004
HFMA Searching for Risk, April 2004
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptxPRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
PRINCIPLES-OF-RISK-AND-MANAGEMENT.pptx
 
world_vision-cva_-_risk_presentation.pptx
world_vision-cva_-_risk_presentation.pptxworld_vision-cva_-_risk_presentation.pptx
world_vision-cva_-_risk_presentation.pptx
 
Hse, Risk Assessment
Hse, Risk AssessmentHse, Risk Assessment
Hse, Risk Assessment
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
 
Emergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer functionEmergence of the Chief Risk Officer function
Emergence of the Chief Risk Officer function
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Quantifying Cyber Risk
Quantifying Cyber Risk Quantifying Cyber Risk
Quantifying Cyber Risk
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 

More from poulterbarbara

1 Activity Analysis of Coloring M.docx
1  Activity Analysis of Coloring M.docx1  Activity Analysis of Coloring M.docx
1 Activity Analysis of Coloring M.docxpoulterbarbara
 
0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docxpoulterbarbara
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docxpoulterbarbara
 
1 Case Study #23 Is Yahoo!’s Business Model .docx
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docxpoulterbarbara
 
06identifying exceptions and RECOGNIZING WINSWe can .docx
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docxpoulterbarbara
 
08creating YOUR GAME PLANNothing will work unle.docx
08creating  YOUR GAME PLANNothing will work  unle.docx08creating  YOUR GAME PLANNothing will work  unle.docx
08creating YOUR GAME PLANNothing will work unle.docxpoulterbarbara
 
1 2Week 4 Evidence and Standards ACC49142020Week .docx
1     2Week 4 Evidence and Standards ACC49142020Week .docx1     2Week 4 Evidence and Standards ACC49142020Week .docx
1 2Week 4 Evidence and Standards ACC49142020Week .docxpoulterbarbara
 
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docxpoulterbarbara
 
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docxpoulterbarbara
 
.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docxpoulterbarbara
 
. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docxpoulterbarbara
 
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docxpoulterbarbara
 
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docxpoulterbarbara
 
... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docxpoulterbarbara
 
-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docxpoulterbarbara
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docxpoulterbarbara
 
1 How to Overcome Public Perception Issues on Potable R.docx
1  How to Overcome Public Perception Issues on Potable R.docx1  How to Overcome Public Perception Issues on Potable R.docx
1 How to Overcome Public Perception Issues on Potable R.docxpoulterbarbara
 
. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docxpoulterbarbara
 
. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docxpoulterbarbara
 
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docxpoulterbarbara
 

More from poulterbarbara (20)

1 Activity Analysis of Coloring M.docx
1  Activity Analysis of Coloring M.docx1  Activity Analysis of Coloring M.docx
1 Activity Analysis of Coloring M.docx
 
0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docx
 
1 Case Study #23 Is Yahoo!’s Business Model .docx
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docx
 
06identifying exceptions and RECOGNIZING WINSWe can .docx
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docx
 
08creating YOUR GAME PLANNothing will work unle.docx
08creating  YOUR GAME PLANNothing will work  unle.docx08creating  YOUR GAME PLANNothing will work  unle.docx
08creating YOUR GAME PLANNothing will work unle.docx
 
1 2Week 4 Evidence and Standards ACC49142020Week .docx
1     2Week 4 Evidence and Standards ACC49142020Week .docx1     2Week 4 Evidence and Standards ACC49142020Week .docx
1 2Week 4 Evidence and Standards ACC49142020Week .docx
 
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
 
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
 
.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx
 
. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx
 
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
 
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
 
... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx
 
-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docx
 
1 How to Overcome Public Perception Issues on Potable R.docx
1  How to Overcome Public Perception Issues on Potable R.docx1  How to Overcome Public Perception Issues on Potable R.docx
1 How to Overcome Public Perception Issues on Potable R.docx
 
. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx
 
. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx
 
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Risk Management Insight FAIR(FACTOR AN.docx

  • 1. Risk Management Insight FAIR (FACTOR ANALYSIS OF INFORMATION RISK) Basic Risk Assessment Guide FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC NOTE: Before using this assessment guide… Using this guide effectively requires a solid understanding of FAIR concepts ‣ As with any high-level analysis method, results can depend upon variables that may not be accounted for at this level of abstraction ‣ The loss magnitude scale described in this section is adjusted for a specific organizational size and risk capacity. Labels used in the scale (e.g., “Severe”, “Low”, etc.) may need to be adjusted when analyzing organizations of different sizes ‣ This process is a simplified, introductory version that may not be appropriate for some analyses
  • 2. Basic FAIR analysis is comprised of ten steps in four stages: Stage 1 – Identify scenario components 1. Identify the asset at risk 2. Identify the threat community under consideration Stage 2 – Evaluate Loss Event Frequency (LEF) 3. Estimate the probable Threat Event Frequency (TEF) 4. Estimate the Threat Capability (TCap) 5. Estimate Control strength (CS) 6. Derive Vulnerability (Vuln) 7. Derive Loss Event Frequency (LEF) Stage 3 – Evaluate Probable Loss Magnitude (PLM) 8. Estimate worst-case loss 9. Estimate probable loss Stage 4 – Derive and articulate Risk 10. Derive and articulate Risk Risk Loss Event Frequency Probable Loss
  • 3. Magnitude Threat Event Frequency Vulnerability Contact Action Control Strength Threat Capability Primary Loss Factors Secondary Loss Factors Asset Loss Factors Threat Loss Factors Organizational Loss Factors External Loss Factors FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC
  • 4. Stage 1 – Identify Scenario Components Step 1 – Identify the Asset(s) at risk In order to estimate the control and value characteristics within a risk analysis, the analyst must first identify the asset (object) under evaluation. If a multilevel analysis is being performed, the analyst will need to identify and evaluate the primary asset (object) at risk and all meta-objects that exist between the primary asset and the threat community. This guide is intended for use in simple, single level risk analysis, and does not describe the additional steps required for a multilevel analysis. Asset(s) at risk: _____________________________________________________ _ Step 2 – Identify the Threat Community In order to estimate Threat Event Frequency (TEF) and Threat Capability (TCap), a specific threat community must first be identified. At minimum, when evaluating the risk associated with malicious acts, the analyst has to decide whether the threat community is human or malware, and internal or external. In most circumstances, it’s appropriate to define the
  • 5. threat community more specifically – e.g., network engineers, cleaning crew, etc., and characterize the expected nature of the community. This document does not include guidance in how to perform broad-spectrum (i.e., multi-threat community) analyses. Threat community: _____________________________________________________ _ Characterization FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Stage 2 – Evaluate Loss Event Frequency Step 3 – Threat Event Frequency (TEF) The probable frequency, within a given timeframe, that a threat agent will act against an asset Contributing factors: Contact Frequency, Probability of Action Very High (VH) > 100 times per year High (H) Between 10 and 100 times per year Moderate (M) Between 1 and 10 times per year
  • 6. Low (L) Between .1 and 1 times per year Very Low (VL) < .1 times per year (less than once every ten years) Rationale FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Step 4 – Threat Capability (Tcap) The probable level of force that a threat agent is capable of applying against an asset Contributing factors: Skill, Resources Very High (VH) Top 2% when compared against the overall threat population High (H) Top 16% when compared against the overall threat population Moderate (M) Average skill and resources (between bottom 16% and top 16%) Low (L) Bottom 16% when compared against the overall threat population Very Low (VL) Bottom 2% when compared against the overall
  • 7. threat population Rationale FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Step 5 – Control strength (CS) The expected effectiveness of controls, over a given timeframe, as measured against a baseline level of force Contributing factors: Strength, Assurance Very High (VH) Protects against all but the top 2% of an avg. threat population High (H) Protects against all but the top 16% of an avg. threat population Moderate (M) Protects against the average threat agent Low (L) Only protects against bottom 16% of an avg. threat population Very Low (VL) Only protects against bottom 2% of an avg. threat population Rationale
  • 8. FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Step 6 – Vulnerability (Vuln) The probability that an asset will be unable to resist the actions of a threat agent Tcap (from step 4): CS (from step 5): Vulnerability VH VH VH VH H M H VH VH H M L Tcap M VH H M L VL L H M L VL VL VL M L VL VL VL VL L M H VH Control Strength Vuln (from matrix above): FAIR™ Basic Risk Assessment Guide
  • 9. All Content Copyright Risk Management Insight, LLC Step 7 – Loss Event Frequency (LEF) The probable frequency, within a given timeframe, that a threat agent will inflict harm upon an asset TEF (from step 3): Vuln (from step 6): Loss Event Frequency VH M H VH VH VH H L M H H H TEF M VL L M M M L VL VL L L L VL VL VL VL VL VL VL L M H VH Vulnerability LEF (from matrix above): FAIR™ Basic Risk Assessment Guide
  • 10. All Content Copyright Risk Management Insight, LLC Stage 3 – Evaluate Probable Loss Magnitude Step 8 – Estimate worst-case loss Estimate worst-case magnitude using the following three steps: ‣ Determine the threat action that would most likely result in a worst-case outcome ‣ Estimate the magnitude for each loss form associated with that threat action ‣ “Sum” the loss form magnitudes Loss Forms Threat Actions Productivity Response Replacement Fine/Judgments Comp. Adv. Reputation Access Misuse Disclosure Modification Deny Access Magnitude Range Low End Range High End Severe (SV) $10,000,000 -- High (H) $1,000,000 $9,999,999
  • 11. Significant (Sg) $100,000 $999,999 Moderate (M) $10,000 $99,999 Low (L) $1,000 $9,999 Very Low (VL) $0 $999 FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Step 9 – Estimate probable loss Estimate probable loss magnitude using the following three steps: ‣ Identify the most likely threat community action(s) ‣ Evaluate the probable loss magnitude for each loss form ‣ “Sum” the magnitudes Loss Forms Threat Actions Productivity Response Replacement Fine/Judgments Comp. Adv. Reputation Access Misuse Disclosure Modification
  • 12. Deny Access Magnitude Range Low End Range High End Severe (SV) $10,000,000 -- High (H) $1,000,000 $9,999,999 Significant (Sg) $100,000 $999,999 Moderate (M) $10,000 $99,999 Low (L) $1,000 $9,999 Very Low (VL) $0 $999 FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Stage 4 – Derive and Articulate Risk Step 10 – Derive and Articulate Risk The probable frequency and probable magnitude of future loss Well-articulated risk analyses provide decision-makers with at least two key pieces of information: ‣ The estimated loss event frequency (LEF), and ‣ The estimated probable loss magnitude (PLM) This information can be conveyed through text, charts, or both.
  • 13. In most circumstances, it’s advisable to also provide the estimated high-end loss potential so that the decision-maker is aware of what the worst-case scenario might look like. Depending upon the scenario, additional specific information may be warranted if, for example: ‣ Significant due diligence exposure exists ‣ Significant reputation, legal, or regulatory considerations exist Risk Severe H H C C C High M H H C C PLM Significant M M H H C Moderate L M M H H Low L L M M M Very Low L L M M M VL L M H VH LEF LEF (from step 7): PLM (from step 9): WCLM (from step 8): Key Risk Level
  • 14. C Critical H High M Medium L Low FAIR™ Basic Risk Assessment Guide All Content Copyright Risk Management Insight, LLC Running head: CLUB CLUB Goal and mission of the club; ways to achieve the mission and goals. The main goal of this club is to have the ability to enhance the presence of group discussions in the school. There has been a drastic drop in the performance of the students. Therefore this group aims at elevating the levels at which students are reading. There will include the implementation of several ways that the student will be made to engage in reading. The first means that the club will use is the application of groups. All the students within the school will be allocated groups in which they will be participating in discussions that will be geared at specific topics after the groups have accomplished the necessary and desired subject of study, they will have to present to the authorities. These are the teachers. (Wieland, Biggs, Brockman, Johnson, Meiers, Novotny, 2020). Members of the club and the recruitment process. The club will be made up of the best students from the faculties in the school. I will use unique criteria to have the studies agree to participate in the club. This will be through the use of
  • 15. persuasion from the management team of the school. They will convince the students that there will be additional benefits that will come with them joining the clubs What will happen at the meetings? In the club, there will be meetings that will be carried out once a week. The meeting s will aim to come up with a strategy that will be used in the application of the ways that will be needed to have the students form the study groups. (Anning, 2003) What sort of events the club will hold. Our club will hold several events, such as co-curricular activities. These will help in the making of the learning environment more enjoyable therefore help enhance the studying process which mane students tent to find tiresome and boring. The events will be organized twice per week (Allen, 1931). Benefits The club will have several benefits that will come by the activities that the member will be associated with. The students will learn the art of wrong as groups to achieve academic excellence. Also, the students will learn much art, including crafting, which will be among the taught activities in the events. References Allen, C. F. (1931). Initiating a School Club Program. Junior- Senior High School Clearing House, 5(7), 389-394. Anning, A. (2003). Pathways to the graphical club: The crossroad of home and pre-school. Journal of Early Childhood Literacy, 3(1), 5-35. Repenning, A., Basawapatna, A., & Koh, K. H. (2009, May). Making university education more like middle school computer club: facilitating the flow of inspiration. In Proceedings of the 14th Western Canadian Conference on Computing Education (pp. 9-16). Wieland, M. L., Biggs, B. K., Brockman, T. A., Johnson, A., Meiers, S. J., Sim, L. A., ... & Novotny, P. J. (2020). Club Fit: Development of a Physical Activity and Healthy Eating Intervention at a Boys & Girls Club After School Program. The
  • 16. Journal of Primary Prevention, 1-18.