SlideShare a Scribd company logo
The	Application	Of	

Laplacian	Probability	Models	In	

Likelihood	Calculations	For

Information	Security	

Risk	Assessments
JORDAN	SCHROEDER,	CISSP,	CISM
by
NOVEMBER	13,	2015
INTRO
WHO AM I?
▸ Member of the GRC team at Visier, Inc
▸ Moderator of Security StackExchange
▸ Former teacher, actor, singer, director, Coast Guard Officer,
undertaker, database designer, tax preparer, business owner,
day trader
▸ http://www.linkedin.com/in/schroederjordan
▸ http://security.stackexchange.com/users/6253/schroeder
▸ https://gophishyourself.wordpress.com
INTRO
WHO AM I?
▸ NOT a formally trained Risk Professional
▸ but deep respect for Risk Professionals
▸ NOT a probabilities expert
▸ but deep respect for probabilities
▸ My experience as a day trader was affected by risk models
and probabilities
INTRO
RISK PROFESSIONALS SHROUDED IN MYSTERY
INTRO
PROBABILITIES
http://andrewgelman.com/wp-content/uploads/2009/09/univ16.png
INTRO
MY INTRO TO INFOSEC RISK
▸ Risk models for organizations I worked in
▸ CISSP
▸ CISM
INTRO
RISK WAS TOO RISKY
▸ Big subject
▸ Lots of examples of risk gone wrong (e.g. 2008 credit
crisis)
▸ Simplistic formulas (ALE = ARO x SLE)
▸ Mixed with arcane incantations:
▸ My conclusion: leave it to the professionals
https://en.wikipedia.org/wiki/Black%E2%80%93Scholes_model
INTRO
LEAVING IT TO THE PROFESSIONALS
▸ Used existing models in the organization
▸ Tried to understand what the pros had done
▸ Lots of questions that didn’t add up
▸ “What we’ve done isn’t perfect, but it’s what the
organization can handle right now.”
▸ … and then it happened …
COULD YOU DEVELOP
AN ERM FOR US?
RISKY BUSINESS
RISK FRAMEWORKS GALORE!
▸ COSO
▸ ISO 31000/ ISO 27005
▸ NIST 800-39
▸ RISK IT
▸ FAIR
▸ OCTAVE Allegro
RISKY BUSINESS
SIMILARITIES
▸ Frameworks very similar in goal:
▸ Repeatable
▸ Measurable
▸ Consistent
▸ Complete
▸ Cyclical
▸ Maturing
RISKY BUSINESS
THE BASICS - THE PROBLEM
▸ Risk = Likelihood × Impact
▸ Annualized Loss Expectancy (ALE) = Likelihood × Value
ISO 31000
RISKY BUSINESS
VALUE PROPOSITION
▸ Value/Consequence/Impact is easy to understand and calculate
▸ Risk Frameworks spend large sections guiding the reader on
the useful ways to conceive of and update Value/
Consequence/Impact
▸ But … Likelihood?
▸ Brings to mind complex maths
▸ Where are those formulas?
▸ Non-math options kept being mentioned …
RISKY BUSINESS
ONE THING KEPT BUGGING ME
ISO 31000:
5.4.3 (Risk Analysis)
“Consequences and their likelihood can be determined by
modelling the outcomes of an event or set of events, or by
extrapolation from experimental studies or from available
data.”
RISKY BUSINESS
ONE THING KEPT BUGGING ME
ISO 31010:
Likelihood:
1. Historical data
2. Forecasts (fault tree analysis, simulations)
3. Opinion
RISKY BUSINESS
ONE THING KEPT BUGGING ME
NIST 800-39: “Managing Information Security Risk”
Likelihood determinations can be based on either threat assumptions
or actual threat data (e.g., historical data on cyber attacks, … or
specific information on adversary capabilities, intentions, and
targeting). When specific and credible threat data is available …
organizations can use the empirical data and statistical analyses to
determine more specific probabilities of threat events occurring.
In addition, some organizations prefer quantitative risk assessments
while other organizations, particularly when the assessment involves
a high degree of uncertainty, prefer qualitative risk assessments.
RISKY BUSINESS
ONE THING KEPT BUGGING ME
NIST 800-30 r1 “Guide for Conducting Risk Assessments”
Appendix G
The term likelihood, as discussed in this guideline, is not
likelihood in the strict sense of the term; rather, it is a
likelihood score. Risk assessors do not define a likelihood
function in the statistical sense. Instead, risk assessors assign
a score based on available evidence, experience, and expert
judgment.
RISKY BUSINESS
ONE THING KEPT BUGGING ME
OCTAVE Allegro
“However, because it is often difficult to accurately quantify
probability, especially with respect to security vulnerabilities
and events, probability is expressed in the OCTAVE Allegro
methodology qualitatively as high, medium, or low. “
RISKY BUSINESS
GAO SAVE US!!
General Accounting Office (GAO):
“Estimating the likelihood that such threats will materialize
based on historical information and judgment of
knowledgeable individuals.”
RISKY BUSINESS
LET’S RECAP
▸ Modeling
▸ Extrapolation
▸ Fault Tree Analysis
▸ Statistical Analysis
▸ Quantitative
▸ Opinion
▸ Personal judgement
▸ Estimate
▸ Assumption
▸ Qualitative
RISKY BUSINESS
DO YOU FEEL LUCKY?
http://andrewgelman.com/wp-content/uploads/2009/09/univ16.png
OR
https://www.pehub.com/wp-content/uploads/2013/02/dartboard.jpg
RISKY BUSINESS
THE Q’S
▸ Quantitative or Qualitative?
▸ Is Qualitative analysis just the lazy way out?
▸ I set upon a quest to understand the mathematically valid
approach of calculating likelihood in InfoSec Risk Analysis
▸ If I was confused, I figured others might be, too
▸ What I discovered surprised me
MARTIAN COIN
FLIPS
MARTIAN COIN FLIPS
THIS PORTION OF THE PRESENTATION FROM
Chapter 18
MARTIAN COIN FLIPS
THE LONGEST JOURNEY STARTS WITH THE FIRST STEP
▸ I started my quest looking to develop a mathematical
model that would be appropriate for the InfoSec field
▸ Started to develop a Bayesian Net that would
accommodate the unique challenges of InfoSec risk
▸ evolving threats
▸ 0-days
▸ weaknesses in patch processes
MARTIAN COIN FLIPS
DOWN BY THE BAYES
▸ Jaynes text led me to a discussion about the
difference between data and information when it
comes to probability calculation
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ What is the probability that a coin will come up tails on the next toss?
▸ P = 0.5
▸ What if you examined the coin (more data) to ensure it was a normal
coin?
▸ P = 0.5
▸ What if you knew more about the design on the coin, when it was
made, etc.?
▸ P = 0.5
▸ What if the coin had already been flipped 5 times and it came up tails
each time?
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸More data about the coin’s flip history
does not affect the expectation of
probability
Jaynes pg 558
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ What about the likelihood that there used to be life on Mars?
▸ Maybe yes, maybe no
▸ Let’s set it to P = 0.5
▸ New data radically alters the probability one way or the other
▸ One new piece of information can make the difference
▸ What if the coin we were flipping was found in the sands of
Mars?
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸New data about Mars affects the
expectation of the probability
Jaynes pg 558
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ Calculating probability by itself is not enough
▸ One must know a system’s resilience to new data
▸ How new data affects probability is the key
▸ Requires knowledge of the system
▸ We know how a coin flip works
▸ Uncertainty and probability
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ We can apply this to calculating the likelihood
of a web server compromise
▸ WordPress installation
▸ 2 compromises last year
▸ each by a different vulnerable plug-in
▸ now fully patched
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ What is the likelihood that my server will be
compromised this year?
▸ How do you set up that calculation?
▸ What data do you use?
▸ What historical data do you use?
▸ What new data might throw off your calculations?
▸ 0-days?
MARTIAN COIN FLIPS
A FEW NOTES ON HISTORY …
▸ Can you use historical data when the system
changes?
▸ Patches, configuration changes, new mitigations
▸ The number of 0-days in the past is not indicative of
0-days in the future
▸ Historical data is useful when the system is unaltered:
▸ Threats, costs, unpatched systems
MARTIAN COIN FLIPS
WHEN INFORMATION ATTACKS
▸ How can you perform Quantitative probability
analysis when:
▸ there is not enough data (can’t use history in a
changing system)?
▸ every new piece of data radically alters the
probability calculation?
▸ Maybe “more data” is not the point
“BUT, STATISTICAL ANALYSIS
DEPENDS ON MORE DATA!”
LAPLACE
ENTER, LAPLACE
Laplace Transform
Laplace’s equation using Laplace operator
https://en.wikipedia.org/wiki/Pierre-Simon_Laplace
LAPLACE
LAPLACE’S INDUCTIVE PROBABILITY
Laplace and Bayes are the guys who wrote the rules on
how to use historical data to estimate future probability
LAPLACE
LAPLACE’S FOLLY
▸ (5000 × 365.25 + 1) : 1 = 1,826,251 : 1 in favour of the sun
rising tomorrow
▸ Under the assumption that the earth was 5000 years old
▸ The whole “sunrise” example was a huge mistake…
LAPLACE
LAPLACE’S SANITY
▸ “But [the probability of the sun rising tomorrow] is far
greater for him who, seeing in the totality of
phenomena the principle regulating the days and
seasons, realizes that nothing at the present moment
can arrest the course of it.”
▸ Translation:
▸ Don’t blindly throw numbers into a formula
▸ Knowledge trumps “more data”
LAPLACE
LAPLACE’S HOPE
▸ What does this mean for us?
▸ More historical data about the number of days the
sun has risen changes the probability calculation
▸ More historical data does not alter the probability of
the sun rising tomorrow, since we understand the
principles
▸ Knowledge of the “principles” can override the
importance of statistical data
LAPLACE
FAILURE ANALYSIS
▸ What’s our risk in regards to email infections?
▸ How many email infection attempts last year?
▸ How many successful email infections last year?
▸ Infections / Attempts = Likelihood per attempt this
year?
LAPLACE
FAILURE IN ANALYSIS
▸ Infections / Attempts = Likelihood?
▸ Only valid if the system does not change!
▸ Were the infections due to a specific vulnerability?
▸ Was there a spear-phishing campaign?
▸ Was there a single user clicking every spam email they got?
▸ Knowing the principles of the system overrides a strict
statistical analysis
LAPLACE
EQUIVALENT TO A SUNRISE?
▸ What about a situation where, despite a changing
system, failures appear to be predictable?
▸ What about InfoSec failures that are as sure as a
sunrise?
LAPLACE
THAT’S NOT A NET, THAT’S A STRING
▸ My Bayes Net was looking shoddy
▸ Historical data disappeared
▸ I was left with the ‘conditionals’ to the statistical
probabilities
▸ borne from expert knowledge of the systems
▸ What I had left looked a lot like a pure Qualitative
analysis
CHOSE AN
ANALYSIS METHOD
BE CHOOSEY
QUALIFIED ANALYSIS
▸ Qualitative Likelihood Analysis no longer appeared
to be the lazy way out
▸ Perhaps the Qualitative approach might even be the
better way
▸ How to make a valid choice?
BE CHOOSEY
QUALIFIED ANALYSIS
▸ Quantitative Likelihood Analysis means using some
form of statistical analysis
▸ For InfoSec Risk in a changing system, this appears
to be invalid
▸ Qualitative Likelihood Analysis allows you to use your
judgement and knowledge of the system
▸ The defensive technologies, the patch history, the
people, configuration changes
BE CHOOSEY
QUALITATIVE VS QUANTITATIVE
▸ Risk Frameworks offer the choice
▸ but little guidance on the choice
▸ Quantitative analysis produces numbers
▸ with decimal points!
▸ Qualitative analysis “feels” wrong
BE CHOOSEY
ENORMOUS CONFUSION OUT THERE
▸ https://en.wikipedia.org/wiki/Risk_assessment [accessed Oct 30, 2015]
▸ “Risk assessment is the determination of quantitative or qualitative
estimate of risk …”
▸ Talks about quantitative then never mentions qualitative assessments …
▸ http://www.sans.edu/research/leadership-laboratory/article/risk-
assessment
▸ “We now have a quantitative risk assessment value of $15 million and a
qualitative risk level of High.”
▸ author confuses the events in the ALE formula
BE CHOOSEY
CLEAR THE CONFUSION
▸ It is important to understand that one can calculate
▸ Likelihood
▸ Impact
▸ using either
▸ Qualitative Analysis
▸ Quantitative Analysis
BE CHOOSEY
WHEN TO USE QUANTITATIVE PROBABILITY
▸ It is entirely possible to determine a Quantitative
probability
▸ Used in Finance and Manufacturing all the time
▸ Perfect for when you have lots of historical data
▸ The subjects need to be comparable
▸ 1000 servers all configured the same way
▸ (ISO 31010 Annex B presents a full analysis of methods)
https://www.flickr.com/photos/trevmeister/8413196866
BE CHOOSEY
QUANTITATIVELY PROBLEMATIC - STAMP
“… for hazards associated with standard systems with abundant
historical data, it may be possible to define likelihood using a
quantitative probability of occurrence. However, for most complex
socio-technical** systems with little or no historical experience …
a qualitative assessment of likelihood is the best that can be
achieved.” 

[Dulac, 2007]
STAMP (Systems-Theoretic Accident Model and Processes) is
based entirely on a Qualitative approach
[**social-technical: technology used by people]
BE CHOOSEY
QUANTITATIVELY PROBLEMATIC - NIST
“In addition, some organizations prefer quantitative risk
assessments while other organizations, particularly when the
assessment involves a high degree of uncertainty, prefer
qualitative risk assessments.” [NIST 800-39]
“Consideration of uncertainty is especially important when
organizations consider advanced persistent threats (APT)
since assessments of the likelihood of threat event occurrence
can have a great degree of uncertainty.” [NIST 800-30 r1]
BE CHOOSEY
QUANTITATIVELY PROBLEMATIC - ISO 31010
“Full quantitative analysis may not always be possible or
desirable due to insufficient information about the system or
activity being analysed, lack of data, influence of human
factors, etc. ” [5.3.1]
BE CHOOSEY
QUANTITATIVELY PROBLEMATIC - GAO
“… the availability of data can affect the extent to which risk
assessment results can be reliably quantified.”
“Reliably assessing information security risks can be more difficult
than assessing other types of risks, because the data on the
likelihood and costs associated with information security risk
factors are often more limited and because risk factors are
constantly changing.”
“Even if precise information were available, it would soon be out
of date due to fast-paced changes in technology and factors such
as improvements in tools available to would-be intruders. ”
BE CHOOSEY
MOST INFORMATION SYSTEMS ARE
▸ Complex
▸ Socio-technical (those darn people!)
▸ In a state of change
▸ With high degrees of uncertainty
BE CHOOSEY
DATA YOU NEED FOR QUANTITATIVE LIKELIHOOD ANALYSIS
▸ Already stale
▸ About a previous state of the system
▸ Unnecessary (perhaps misleading)
▸ Trumped by knowledge of the system
CONCLUSION
BE QUALITATIVE
CONCLUSION
Unless you have a valid reason not to, 

use a Qualitative approach
BE QUALITATIVE
QUALITATIVE LIKELIHOOD ASSESSMENTS
▸ Low
▸ Medium
▸ High
▸ Improbable
▸ Remote
▸ Occasional
▸ Probable
▸ Frequent
▸ Highly unlikely
▸ Unlikely
▸ Somewhat likely
▸ Highly likely
▸ Almost certain
▸ Very Low
▸ Low
▸ Moderate
▸ High
▸ Very High
BE QUALITATIVE
CRITIQUES OF QUALITY ASSESSMENTS
▸ Too broad to properly compare
▸ With a detailed assessment, it is easier to rank mitigating options!
▸ Response: be careful that you are not trusting in false accuracy
▸ Response: get stakeholders together and prioritize
▸ Misleading labels between assets or departments can cause
confusion
▸ What does “High” mean to you?
▸ Response: central management and guidance/training can help
BE QUALITATIVE
HOW DO I SELL THIS TO OTHERS?
▸ “Someone is going to want a Quantitative Likelihood calculation.
How do I tell them that Qualitative is the valid approach?”
▸ Simply this:
▸ “Since our systems and the threats to those systems are in a
constant state of change, historical statistical data is not
relevant to complete a Quantitative Likelihood calculation.
Risk frameworks for InfoSec systems recommend a Qualitative
approach, which leverages the expert judgement of those
close to the objects of risk, who are best able to estimate
future likelihood.”
GATHERING
QUALITATIVE DATA
QUALITY
WHEN QUALITATIVE PROBABILITY HAS BEEN USED
▸ GAO did a study on organizations that relied on their ERM,
and where the ERM was perceived by the organization to
be effective (Risk done right)
▸ Risk Assessment methods were:
▸ Simple
▸ Mostly Qualitative
QUALITY
GAO TIPS
▸ Segment Risk Assessments into smaller units to limit the scope (easier
to re-assess when necessary)
▸ Make the Risk Assessors the ones who are close to the objects of
risk
▸ System admins, help desk managers, etc.
▸ Use tables, questionnaires (multiple choice) and standardized report
formats
▸ Define the scale to keep it consistent across the organization
▸ Training, guidance documents
QUALITY
GAO TIPS
▸ Business Units responsible for
▸ reassessments
▸ following up on recommendations
▸ Encourages a bottom-up approach to Risk Management
▸ Risk becomes a mindset at the bottom
▸ Controls are better understood and adopted by those
implementing them
THE END
ACKNOWLEDGEMENTS
▸ Dan Bühler, MSc (Mathematics)
▸ Anton Smessaert, PhD (Data Scientist)
▸ Prof. David Wagner (UC Berkeley)
PROBABLY: 

THE BEST WAY TO CALCULATE 

INFOSEC RISK
JORDAN SCHROEDER, CISSP, CISM

More Related Content

Similar to Laplacian Probability Models for InfoSec Likelihood Calculations

Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
Christian Have
 
Up your Infosec game
Up your Infosec gameUp your Infosec game
Up your Infosec game
Michalis Kamprianis
 
17 02-20 improving the counting method to fill the gender gap (bis). (copie)
17 02-20 improving the counting method to fill the gender gap (bis). (copie)17 02-20 improving the counting method to fill the gender gap (bis). (copie)
17 02-20 improving the counting method to fill the gender gap (bis). (copie)
BUSINESS INNOVATION RESEARCH DEVELOPMENT (BIRD)
 
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
paulmarshall
 
Uncertainty short
Uncertainty shortUncertainty short
Uncertainty shortMo Aiken
 
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
Lean Startup Co.
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
Jorge Luis Sierra
 
Managing Uncertainty - 2011
Managing Uncertainty - 2011Managing Uncertainty - 2011
Managing Uncertainty - 2011
RiskShare
 
Data Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessData Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awareness
DataWorks Summit/Hadoop Summit
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1Jeremy Wright
 
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
John Liu
 
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
NashvilleTechCouncil
 
Uncertainty_and_Risk.pptx
Uncertainty_and_Risk.pptxUncertainty_and_Risk.pptx
Uncertainty_and_Risk.pptx
ArchishmaanUpadhyaya1
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
Marcelo Martins
 
Palmer Symposium
Palmer SymposiumPalmer Symposium
Palmer SymposiumEd Bellis
 
Verizon Data Breach Digest 2016
Verizon Data Breach Digest 2016Verizon Data Breach Digest 2016
Verizon Data Breach Digest 2016Ryan Carleton
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
William L. McGill
 
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
Felipe Prado
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
Haystax Technology
 

Similar to Laplacian Probability Models for InfoSec Likelihood Calculations (20)

Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Up your Infosec game
Up your Infosec gameUp your Infosec game
Up your Infosec game
 
17 02-20 improving the counting method to fill the gender gap (bis). (copie)
17 02-20 improving the counting method to fill the gender gap (bis). (copie)17 02-20 improving the counting method to fill the gender gap (bis). (copie)
17 02-20 improving the counting method to fill the gender gap (bis). (copie)
 
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
Harnessing The Power Of (Claim Risk) Analytics Published Captive Review Sept 09
 
Uncertainty short
Uncertainty shortUncertainty short
Uncertainty short
 
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
Connecting Strategy to Execution, Jonathan Bertfield, Senior Faculty, Lean St...
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
 
Managing Uncertainty - 2011
Managing Uncertainty - 2011Managing Uncertainty - 2011
Managing Uncertainty - 2011
 
Data Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessData Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awareness
 
WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1WRIGHT_JEREMY_1000738685-1
WRIGHT_JEREMY_1000738685-1
 
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
Role of Data Science in ERM @ Nashville Analytics Summit Sep 2014
 
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John LiuThe Role of Data Science in Enterprise Risk Management, Presented by John Liu
The Role of Data Science in Enterprise Risk Management, Presented by John Liu
 
Uncertainty_and_Risk.pptx
Uncertainty_and_Risk.pptxUncertainty_and_Risk.pptx
Uncertainty_and_Risk.pptx
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Palmer Symposium
Palmer SymposiumPalmer Symposium
Palmer Symposium
 
Verizon Data Breach Digest 2016
Verizon Data Breach Digest 2016Verizon Data Breach Digest 2016
Verizon Data Breach Digest 2016
 
R af d
R af dR af d
R af d
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

Laplacian Probability Models for InfoSec Likelihood Calculations

  • 2. INTRO WHO AM I? ▸ Member of the GRC team at Visier, Inc ▸ Moderator of Security StackExchange ▸ Former teacher, actor, singer, director, Coast Guard Officer, undertaker, database designer, tax preparer, business owner, day trader ▸ http://www.linkedin.com/in/schroederjordan ▸ http://security.stackexchange.com/users/6253/schroeder ▸ https://gophishyourself.wordpress.com
  • 3. INTRO WHO AM I? ▸ NOT a formally trained Risk Professional ▸ but deep respect for Risk Professionals ▸ NOT a probabilities expert ▸ but deep respect for probabilities ▸ My experience as a day trader was affected by risk models and probabilities
  • 6. INTRO MY INTRO TO INFOSEC RISK ▸ Risk models for organizations I worked in ▸ CISSP ▸ CISM
  • 7. INTRO RISK WAS TOO RISKY ▸ Big subject ▸ Lots of examples of risk gone wrong (e.g. 2008 credit crisis) ▸ Simplistic formulas (ALE = ARO x SLE) ▸ Mixed with arcane incantations: ▸ My conclusion: leave it to the professionals https://en.wikipedia.org/wiki/Black%E2%80%93Scholes_model
  • 8. INTRO LEAVING IT TO THE PROFESSIONALS ▸ Used existing models in the organization ▸ Tried to understand what the pros had done ▸ Lots of questions that didn’t add up ▸ “What we’ve done isn’t perfect, but it’s what the organization can handle right now.” ▸ … and then it happened …
  • 9. COULD YOU DEVELOP AN ERM FOR US?
  • 10. RISKY BUSINESS RISK FRAMEWORKS GALORE! ▸ COSO ▸ ISO 31000/ ISO 27005 ▸ NIST 800-39 ▸ RISK IT ▸ FAIR ▸ OCTAVE Allegro
  • 11. RISKY BUSINESS SIMILARITIES ▸ Frameworks very similar in goal: ▸ Repeatable ▸ Measurable ▸ Consistent ▸ Complete ▸ Cyclical ▸ Maturing
  • 12. RISKY BUSINESS THE BASICS - THE PROBLEM ▸ Risk = Likelihood × Impact ▸ Annualized Loss Expectancy (ALE) = Likelihood × Value ISO 31000
  • 13. RISKY BUSINESS VALUE PROPOSITION ▸ Value/Consequence/Impact is easy to understand and calculate ▸ Risk Frameworks spend large sections guiding the reader on the useful ways to conceive of and update Value/ Consequence/Impact ▸ But … Likelihood? ▸ Brings to mind complex maths ▸ Where are those formulas? ▸ Non-math options kept being mentioned …
  • 14. RISKY BUSINESS ONE THING KEPT BUGGING ME ISO 31000: 5.4.3 (Risk Analysis) “Consequences and their likelihood can be determined by modelling the outcomes of an event or set of events, or by extrapolation from experimental studies or from available data.”
  • 15. RISKY BUSINESS ONE THING KEPT BUGGING ME ISO 31010: Likelihood: 1. Historical data 2. Forecasts (fault tree analysis, simulations) 3. Opinion
  • 16. RISKY BUSINESS ONE THING KEPT BUGGING ME NIST 800-39: “Managing Information Security Risk” Likelihood determinations can be based on either threat assumptions or actual threat data (e.g., historical data on cyber attacks, … or specific information on adversary capabilities, intentions, and targeting). When specific and credible threat data is available … organizations can use the empirical data and statistical analyses to determine more specific probabilities of threat events occurring. In addition, some organizations prefer quantitative risk assessments while other organizations, particularly when the assessment involves a high degree of uncertainty, prefer qualitative risk assessments.
  • 17. RISKY BUSINESS ONE THING KEPT BUGGING ME NIST 800-30 r1 “Guide for Conducting Risk Assessments” Appendix G The term likelihood, as discussed in this guideline, is not likelihood in the strict sense of the term; rather, it is a likelihood score. Risk assessors do not define a likelihood function in the statistical sense. Instead, risk assessors assign a score based on available evidence, experience, and expert judgment.
  • 18. RISKY BUSINESS ONE THING KEPT BUGGING ME OCTAVE Allegro “However, because it is often difficult to accurately quantify probability, especially with respect to security vulnerabilities and events, probability is expressed in the OCTAVE Allegro methodology qualitatively as high, medium, or low. “
  • 19. RISKY BUSINESS GAO SAVE US!! General Accounting Office (GAO): “Estimating the likelihood that such threats will materialize based on historical information and judgment of knowledgeable individuals.”
  • 20. RISKY BUSINESS LET’S RECAP ▸ Modeling ▸ Extrapolation ▸ Fault Tree Analysis ▸ Statistical Analysis ▸ Quantitative ▸ Opinion ▸ Personal judgement ▸ Estimate ▸ Assumption ▸ Qualitative
  • 21. RISKY BUSINESS DO YOU FEEL LUCKY? http://andrewgelman.com/wp-content/uploads/2009/09/univ16.png OR https://www.pehub.com/wp-content/uploads/2013/02/dartboard.jpg
  • 22. RISKY BUSINESS THE Q’S ▸ Quantitative or Qualitative? ▸ Is Qualitative analysis just the lazy way out? ▸ I set upon a quest to understand the mathematically valid approach of calculating likelihood in InfoSec Risk Analysis ▸ If I was confused, I figured others might be, too ▸ What I discovered surprised me
  • 24. MARTIAN COIN FLIPS THIS PORTION OF THE PRESENTATION FROM Chapter 18
  • 25. MARTIAN COIN FLIPS THE LONGEST JOURNEY STARTS WITH THE FIRST STEP ▸ I started my quest looking to develop a mathematical model that would be appropriate for the InfoSec field ▸ Started to develop a Bayesian Net that would accommodate the unique challenges of InfoSec risk ▸ evolving threats ▸ 0-days ▸ weaknesses in patch processes
  • 26. MARTIAN COIN FLIPS DOWN BY THE BAYES ▸ Jaynes text led me to a discussion about the difference between data and information when it comes to probability calculation
  • 27. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ What is the probability that a coin will come up tails on the next toss? ▸ P = 0.5 ▸ What if you examined the coin (more data) to ensure it was a normal coin? ▸ P = 0.5 ▸ What if you knew more about the design on the coin, when it was made, etc.? ▸ P = 0.5 ▸ What if the coin had already been flipped 5 times and it came up tails each time?
  • 28. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸More data about the coin’s flip history does not affect the expectation of probability Jaynes pg 558
  • 29. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ What about the likelihood that there used to be life on Mars? ▸ Maybe yes, maybe no ▸ Let’s set it to P = 0.5 ▸ New data radically alters the probability one way or the other ▸ One new piece of information can make the difference ▸ What if the coin we were flipping was found in the sands of Mars?
  • 30. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸New data about Mars affects the expectation of the probability Jaynes pg 558
  • 31. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ Calculating probability by itself is not enough ▸ One must know a system’s resilience to new data ▸ How new data affects probability is the key ▸ Requires knowledge of the system ▸ We know how a coin flip works ▸ Uncertainty and probability
  • 32. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ We can apply this to calculating the likelihood of a web server compromise ▸ WordPress installation ▸ 2 compromises last year ▸ each by a different vulnerable plug-in ▸ now fully patched
  • 33. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ What is the likelihood that my server will be compromised this year? ▸ How do you set up that calculation? ▸ What data do you use? ▸ What historical data do you use? ▸ What new data might throw off your calculations? ▸ 0-days?
  • 34. MARTIAN COIN FLIPS A FEW NOTES ON HISTORY … ▸ Can you use historical data when the system changes? ▸ Patches, configuration changes, new mitigations ▸ The number of 0-days in the past is not indicative of 0-days in the future ▸ Historical data is useful when the system is unaltered: ▸ Threats, costs, unpatched systems
  • 35. MARTIAN COIN FLIPS WHEN INFORMATION ATTACKS ▸ How can you perform Quantitative probability analysis when: ▸ there is not enough data (can’t use history in a changing system)? ▸ every new piece of data radically alters the probability calculation? ▸ Maybe “more data” is not the point
  • 37. LAPLACE ENTER, LAPLACE Laplace Transform Laplace’s equation using Laplace operator https://en.wikipedia.org/wiki/Pierre-Simon_Laplace
  • 38. LAPLACE LAPLACE’S INDUCTIVE PROBABILITY Laplace and Bayes are the guys who wrote the rules on how to use historical data to estimate future probability
  • 39. LAPLACE LAPLACE’S FOLLY ▸ (5000 × 365.25 + 1) : 1 = 1,826,251 : 1 in favour of the sun rising tomorrow ▸ Under the assumption that the earth was 5000 years old ▸ The whole “sunrise” example was a huge mistake…
  • 40. LAPLACE LAPLACE’S SANITY ▸ “But [the probability of the sun rising tomorrow] is far greater for him who, seeing in the totality of phenomena the principle regulating the days and seasons, realizes that nothing at the present moment can arrest the course of it.” ▸ Translation: ▸ Don’t blindly throw numbers into a formula ▸ Knowledge trumps “more data”
  • 41. LAPLACE LAPLACE’S HOPE ▸ What does this mean for us? ▸ More historical data about the number of days the sun has risen changes the probability calculation ▸ More historical data does not alter the probability of the sun rising tomorrow, since we understand the principles ▸ Knowledge of the “principles” can override the importance of statistical data
  • 42. LAPLACE FAILURE ANALYSIS ▸ What’s our risk in regards to email infections? ▸ How many email infection attempts last year? ▸ How many successful email infections last year? ▸ Infections / Attempts = Likelihood per attempt this year?
  • 43. LAPLACE FAILURE IN ANALYSIS ▸ Infections / Attempts = Likelihood? ▸ Only valid if the system does not change! ▸ Were the infections due to a specific vulnerability? ▸ Was there a spear-phishing campaign? ▸ Was there a single user clicking every spam email they got? ▸ Knowing the principles of the system overrides a strict statistical analysis
  • 44. LAPLACE EQUIVALENT TO A SUNRISE? ▸ What about a situation where, despite a changing system, failures appear to be predictable? ▸ What about InfoSec failures that are as sure as a sunrise?
  • 45. LAPLACE THAT’S NOT A NET, THAT’S A STRING ▸ My Bayes Net was looking shoddy ▸ Historical data disappeared ▸ I was left with the ‘conditionals’ to the statistical probabilities ▸ borne from expert knowledge of the systems ▸ What I had left looked a lot like a pure Qualitative analysis
  • 47. BE CHOOSEY QUALIFIED ANALYSIS ▸ Qualitative Likelihood Analysis no longer appeared to be the lazy way out ▸ Perhaps the Qualitative approach might even be the better way ▸ How to make a valid choice?
  • 48. BE CHOOSEY QUALIFIED ANALYSIS ▸ Quantitative Likelihood Analysis means using some form of statistical analysis ▸ For InfoSec Risk in a changing system, this appears to be invalid ▸ Qualitative Likelihood Analysis allows you to use your judgement and knowledge of the system ▸ The defensive technologies, the patch history, the people, configuration changes
  • 49. BE CHOOSEY QUALITATIVE VS QUANTITATIVE ▸ Risk Frameworks offer the choice ▸ but little guidance on the choice ▸ Quantitative analysis produces numbers ▸ with decimal points! ▸ Qualitative analysis “feels” wrong
  • 50. BE CHOOSEY ENORMOUS CONFUSION OUT THERE ▸ https://en.wikipedia.org/wiki/Risk_assessment [accessed Oct 30, 2015] ▸ “Risk assessment is the determination of quantitative or qualitative estimate of risk …” ▸ Talks about quantitative then never mentions qualitative assessments … ▸ http://www.sans.edu/research/leadership-laboratory/article/risk- assessment ▸ “We now have a quantitative risk assessment value of $15 million and a qualitative risk level of High.” ▸ author confuses the events in the ALE formula
  • 51. BE CHOOSEY CLEAR THE CONFUSION ▸ It is important to understand that one can calculate ▸ Likelihood ▸ Impact ▸ using either ▸ Qualitative Analysis ▸ Quantitative Analysis
  • 52. BE CHOOSEY WHEN TO USE QUANTITATIVE PROBABILITY ▸ It is entirely possible to determine a Quantitative probability ▸ Used in Finance and Manufacturing all the time ▸ Perfect for when you have lots of historical data ▸ The subjects need to be comparable ▸ 1000 servers all configured the same way ▸ (ISO 31010 Annex B presents a full analysis of methods) https://www.flickr.com/photos/trevmeister/8413196866
  • 53. BE CHOOSEY QUANTITATIVELY PROBLEMATIC - STAMP “… for hazards associated with standard systems with abundant historical data, it may be possible to define likelihood using a quantitative probability of occurrence. However, for most complex socio-technical** systems with little or no historical experience … a qualitative assessment of likelihood is the best that can be achieved.” 
 [Dulac, 2007] STAMP (Systems-Theoretic Accident Model and Processes) is based entirely on a Qualitative approach [**social-technical: technology used by people]
  • 54. BE CHOOSEY QUANTITATIVELY PROBLEMATIC - NIST “In addition, some organizations prefer quantitative risk assessments while other organizations, particularly when the assessment involves a high degree of uncertainty, prefer qualitative risk assessments.” [NIST 800-39] “Consideration of uncertainty is especially important when organizations consider advanced persistent threats (APT) since assessments of the likelihood of threat event occurrence can have a great degree of uncertainty.” [NIST 800-30 r1]
  • 55. BE CHOOSEY QUANTITATIVELY PROBLEMATIC - ISO 31010 “Full quantitative analysis may not always be possible or desirable due to insufficient information about the system or activity being analysed, lack of data, influence of human factors, etc. ” [5.3.1]
  • 56. BE CHOOSEY QUANTITATIVELY PROBLEMATIC - GAO “… the availability of data can affect the extent to which risk assessment results can be reliably quantified.” “Reliably assessing information security risks can be more difficult than assessing other types of risks, because the data on the likelihood and costs associated with information security risk factors are often more limited and because risk factors are constantly changing.” “Even if precise information were available, it would soon be out of date due to fast-paced changes in technology and factors such as improvements in tools available to would-be intruders. ”
  • 57. BE CHOOSEY MOST INFORMATION SYSTEMS ARE ▸ Complex ▸ Socio-technical (those darn people!) ▸ In a state of change ▸ With high degrees of uncertainty
  • 58. BE CHOOSEY DATA YOU NEED FOR QUANTITATIVE LIKELIHOOD ANALYSIS ▸ Already stale ▸ About a previous state of the system ▸ Unnecessary (perhaps misleading) ▸ Trumped by knowledge of the system
  • 60. BE QUALITATIVE CONCLUSION Unless you have a valid reason not to, 
 use a Qualitative approach
  • 61. BE QUALITATIVE QUALITATIVE LIKELIHOOD ASSESSMENTS ▸ Low ▸ Medium ▸ High ▸ Improbable ▸ Remote ▸ Occasional ▸ Probable ▸ Frequent ▸ Highly unlikely ▸ Unlikely ▸ Somewhat likely ▸ Highly likely ▸ Almost certain ▸ Very Low ▸ Low ▸ Moderate ▸ High ▸ Very High
  • 62. BE QUALITATIVE CRITIQUES OF QUALITY ASSESSMENTS ▸ Too broad to properly compare ▸ With a detailed assessment, it is easier to rank mitigating options! ▸ Response: be careful that you are not trusting in false accuracy ▸ Response: get stakeholders together and prioritize ▸ Misleading labels between assets or departments can cause confusion ▸ What does “High” mean to you? ▸ Response: central management and guidance/training can help
  • 63. BE QUALITATIVE HOW DO I SELL THIS TO OTHERS? ▸ “Someone is going to want a Quantitative Likelihood calculation. How do I tell them that Qualitative is the valid approach?” ▸ Simply this: ▸ “Since our systems and the threats to those systems are in a constant state of change, historical statistical data is not relevant to complete a Quantitative Likelihood calculation. Risk frameworks for InfoSec systems recommend a Qualitative approach, which leverages the expert judgement of those close to the objects of risk, who are best able to estimate future likelihood.”
  • 65. QUALITY WHEN QUALITATIVE PROBABILITY HAS BEEN USED ▸ GAO did a study on organizations that relied on their ERM, and where the ERM was perceived by the organization to be effective (Risk done right) ▸ Risk Assessment methods were: ▸ Simple ▸ Mostly Qualitative
  • 66. QUALITY GAO TIPS ▸ Segment Risk Assessments into smaller units to limit the scope (easier to re-assess when necessary) ▸ Make the Risk Assessors the ones who are close to the objects of risk ▸ System admins, help desk managers, etc. ▸ Use tables, questionnaires (multiple choice) and standardized report formats ▸ Define the scale to keep it consistent across the organization ▸ Training, guidance documents
  • 67. QUALITY GAO TIPS ▸ Business Units responsible for ▸ reassessments ▸ following up on recommendations ▸ Encourages a bottom-up approach to Risk Management ▸ Risk becomes a mindset at the bottom ▸ Controls are better understood and adopted by those implementing them
  • 68. THE END ACKNOWLEDGEMENTS ▸ Dan Bühler, MSc (Mathematics) ▸ Anton Smessaert, PhD (Data Scientist) ▸ Prof. David Wagner (UC Berkeley)
  • 69. PROBABLY: 
 THE BEST WAY TO CALCULATE 
 INFOSEC RISK JORDAN SCHROEDER, CISSP, CISM