SlideShare a Scribd company logo
Risk Analysis for Dummies Presented by Nick Leghorn
Credentials B.S., Security and Risk AnalysisThe Pennsylvania State University Risk Analyst for a government contractor NSA Certified INFOSEC Professional Speaker at The Last HOPE:“The NYC Taxi System: Privacy Vs. Utility”
This talk is for… IT Professionals Penetration testers Network security folk Anyone who needs to explain “risk”
WARNING The risk analysis process depends on the imagination,creativity and integrity of the individuals doing the analysis. The mere application of these techniques without appropriately talented staff does not ensure a proper and thorough risk analysis product.
NOTICE The data, charts and information contained within this presentation are completely notional and do not represent any real data. No sensitive or otherwise classified information is contained within this presentation. FBI, please don’t arrest me.
The Story of Nate and Cliff
What is “Risk”? Seriously. There are microphones, use them!
What is “Risk”? Any uncertainty about the future Technically can be both positive and negative Security questions focus only on negative outcomes
The Six Questions of Risk Management Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
The Risk Equation probability of an outcome given that event  is the combination of probability of an event the value of that event and outcome pair Risk For every event and outcome
Scope Scope  protector threat asset is the set of
Scope Asset Something which provides a benefit to the possessor Something which the protector is charged with safekeeping Protector The entity charged with safekeeping of the asset An entity where the loss of the asset would be harmful Threat An entity with the desire to deny the asset to the protector A force which could destroy, disrupt, or otherwise harm the asset
For Nate and Cliff… Protector: Nate and the NOC Threat: “Hackers” Asset: Company information
Back to the equation… Probability?
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip Heads Tails
Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… The size of each “box” is the probability Strive for MECE Coin Flip Heads Tails Heads Tails Coin rolls away and is lost
“You must not say ‘never.’ That is a lazy slurring-over of the facts.  Actually, [risk analysis] predicts only probabilities.  A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)
Calculating probability Past data Events of concern / total events 3 successful attacks / 30,000 attempts                = 0.0001 probability “Binning your gut” Low, Medium, High
Remember: Probability must be calculated for BOTH Probability of an event Probability of an outcome GIVEN that the event has taken place
Why does “valuation” matter? Some events are more concerning than others Death in a car accident Death in a plane crash Value of the (e,o) pair can be monetary, time based, goodwill based, whatever is of most concern
The process
The process
The process
The process
The process
The process
The process
The process
The process
Method 1: The Simple Chart THIS IS NOT A “RISK MATRIX”!
Method 2: The Probabilistic Chart (Probability of event)*(Probability of outcome given event)
Method 3:  Annualized Loss Expectancy (Probability from last page)*(Loss from event)
Shortcuts and Methodologies
How to use a “Factor based Model” “Factor Based Models” provide a formula for quick and easy assessment of a range of items and rank ordering of them. WARNING: This system only provides a RELATIVE ranking of the items listed.
How to use a “Factor based Model” Assign a range of numbers to each factor Try to use even ranges of numbers (1-4) Ensure that the higher the number, the more it points towards whatever the issue at hand is Evaluate each factor using that range Add up the combined score
CARVER: Target Selection Criticality Accessibility Recoverability Vulnerability Effect  Recognizability
CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
EVIL DONE: Target Selection Exposed Vital Iconic Legitimate Destructible Occupied Near Easy
DSHARPP: Target Selection Demography Symbology History Accessibility Recuperability Population Proximity
CRAVED: Attractiveness of Assets Concealable Removable Available Valuable Enjoyable Disposable
MURDEROUS: Weapon Selection Multipurpose Undetectable Removable Destructive Enjoyable Reliable Obtainable Uncomplicated Safe
ESEER: Facilitation of crime Easy Safe Excusable Enticing Rewarding
HOPE: Ease of social engineering Hour of the day Oversight by manager Pressure Encouragement
Scales
Scales are IMPORTANT Let’s assume a FBM of: A+B+C+D A: 1-4 Vulnerability B: $ of damages C: Time to return to operation (Seconds) D: Lives lost For: Ships? Buildings? Troops?
Types of scales Nominal Binning, no order (apples, pears, oranges) Ordinal Hierarchical, no calculations (High, medium, low) Interval Hierarchy and calculations (1, 2, 4, 8, 16) Natural Interval with countable items (deaths, $, time)
Let’s bring this all together Nate’s presentation
Risk Analysis of Corporate Systems Presented by Nate
Attackers are attempting to penetrate our network to steal, destroy or alter corporate data NOC has been tasked with securing against these attacks Problem at Issue
Attacks over the last 3 years
Andrews Co. Victim of a penetration, customer data leaked Loss of revenue from loss of goodwill: $2.4M Revenue dedicated to fixing systems: $10M TNH Inc. Victim of a lengthy Denial of Service attack Loss of revenue from inability to do business: $30M Revenue dedicated to upgrading systems: $12M Effects of attacks on other companies
Implement an IDS Detects attacks $10,000 to install, $1,000/year in upkeep Tighten firewall Stops intruders $5,000 to install, $500/year in upkeep Install WEP at POS facilities Tightens security $10 in equipment & $5 in labor per facility ($10+$5)*50,000 = $750,000 No upkeep costs Recommendations
Cost benefit analysis As we can see by the above numbers, by spending 766,500 this year we can mitigate the possible effects of an attack  which (on average) will cost $15M. Thus, the loss will be approx. $14,233,500 less than without the recommended upgrades.
Annualized Loss Expectancy
The End (Of the presentation within a presentation)
Remember these? Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
Things to remember… Use common sense! If something looks wrong, it usually is Scope the question Don’t bite off more than you can chew Use proper scales Remember the 6 questions of risk FBMs are quick and easy, but be careful! Check your work! Academic integrity BEFORE making managers happy

More Related Content

What's hot

Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
SlideTeam
 
Risk Management
Risk ManagementRisk Management
Risk Management
Stefan Csosz
 
Risk management
Risk managementRisk management
Risk management
baderali2141
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
SlideTeam
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0Rachael Phelan
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
Towers Perrin
 
Risk management
Risk managementRisk management
Enterprise Risk Management Overview Powerpoint Presentation Slides
Enterprise Risk Management Overview Powerpoint Presentation SlidesEnterprise Risk Management Overview Powerpoint Presentation Slides
Enterprise Risk Management Overview Powerpoint Presentation Slides
SlideTeam
 
Risk management
Risk managementRisk management
Risk management
baderali2141
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
Subhendu Datta
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's
Andrew Smart
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
SlideTeam
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditorsminkhollow
 
COSO VS ERM -
COSO VS ERM - COSO VS ERM -
COSO VS ERM -
Naresh Parandhaman
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Risk indicators
Risk indicatorsRisk indicators
Risk indicators
Sravani Varma
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentationmmagario
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
Richard Swartzbaugh
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
Andrew Smart
 

What's hot (20)

Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides Enterprise Risk Management PowerPoint Presentation Slides
Enterprise Risk Management PowerPoint Presentation Slides
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0127017438_RMA_OperationalRiskAppetite_v1.0
127017438_RMA_OperationalRiskAppetite_v1.0
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
 
Risk management
Risk managementRisk management
Risk management
 
Enterprise Risk Management Overview Powerpoint Presentation Slides
Enterprise Risk Management Overview Powerpoint Presentation SlidesEnterprise Risk Management Overview Powerpoint Presentation Slides
Enterprise Risk Management Overview Powerpoint Presentation Slides
 
Risk management
Risk managementRisk management
Risk management
 
Risk Overview & Risk management
Risk Overview & Risk managementRisk Overview & Risk management
Risk Overview & Risk management
 
Managing with KPI's and KRI's
Managing with KPI's and KRI's Managing with KPI's and KRI's
Managing with KPI's and KRI's
 
Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides Risk Management Process Steps PowerPoint Presentation Slides
Risk Management Process Steps PowerPoint Presentation Slides
 
Risk Assessment For Internal Auditors
Risk Assessment For Internal AuditorsRisk Assessment For Internal Auditors
Risk Assessment For Internal Auditors
 
COSO VS ERM -
COSO VS ERM - COSO VS ERM -
COSO VS ERM -
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Risk indicators
Risk indicatorsRisk indicators
Risk indicators
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020 Enterprise Risk Management (ERM) Framework 2020
Enterprise Risk Management (ERM) Framework 2020
 
Integrating Risk Appetite With Strategy Feb 14 2011
Integrating Risk Appetite With Strategy   Feb 14 2011Integrating Risk Appetite With Strategy   Feb 14 2011
Integrating Risk Appetite With Strategy Feb 14 2011
 

Similar to Risk Analysis for Dummies

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
Resolver Inc.
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
Resolver Inc.
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
madlynplamondon
 
Risk Management Insight FAIR(FACTOR ANA
           Risk Management Insight       FAIR(FACTOR ANA           Risk Management Insight       FAIR(FACTOR ANA
Risk Management Insight FAIR(FACTOR ANA
troutmanboris
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
adkinspaige22
 
Risk Management Insight FAIR(FACTOR AN.docx
           Risk Management Insight        FAIR(FACTOR AN.docx           Risk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
boadverna
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
EC-Council
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
gertrudebellgrove
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
gertrudebellgrove
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
poulterbarbara
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And RiskFaheem Ul Hasan
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
tarifarmarie
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
Alexander Hutton
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
Haystax Technology
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
PECB
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
Marc Vael
 

Similar to Risk Analysis for Dummies (20)

Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Prof m02 v2
Prof m02 v2Prof m02 v2
Prof m02 v2
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
 
Risk Management Insight FAIR(FACTOR ANA
           Risk Management Insight       FAIR(FACTOR ANA           Risk Management Insight       FAIR(FACTOR ANA
Risk Management Insight FAIR(FACTOR ANA
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Insight FAIR(FACTOR AN.docx
           Risk Management Insight        FAIR(FACTOR AN.docx           Risk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Web applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk AssessmentWeb applications: How Penetration Tests can improve your Risk Assessment
Web applications: How Penetration Tests can improve your Risk Assessment
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Sect f41
Sect f41Sect f41
Sect f41
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Risk Analysis for Dummies

  • 1. Risk Analysis for Dummies Presented by Nick Leghorn
  • 2. Credentials B.S., Security and Risk AnalysisThe Pennsylvania State University Risk Analyst for a government contractor NSA Certified INFOSEC Professional Speaker at The Last HOPE:“The NYC Taxi System: Privacy Vs. Utility”
  • 3. This talk is for… IT Professionals Penetration testers Network security folk Anyone who needs to explain “risk”
  • 4. WARNING The risk analysis process depends on the imagination,creativity and integrity of the individuals doing the analysis. The mere application of these techniques without appropriately talented staff does not ensure a proper and thorough risk analysis product.
  • 5. NOTICE The data, charts and information contained within this presentation are completely notional and do not represent any real data. No sensitive or otherwise classified information is contained within this presentation. FBI, please don’t arrest me.
  • 6. The Story of Nate and Cliff
  • 7. What is “Risk”? Seriously. There are microphones, use them!
  • 8. What is “Risk”? Any uncertainty about the future Technically can be both positive and negative Security questions focus only on negative outcomes
  • 9. The Six Questions of Risk Management Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
  • 10. The Risk Equation probability of an outcome given that event is the combination of probability of an event the value of that event and outcome pair Risk For every event and outcome
  • 11. Scope Scope protector threat asset is the set of
  • 12. Scope Asset Something which provides a benefit to the possessor Something which the protector is charged with safekeeping Protector The entity charged with safekeeping of the asset An entity where the loss of the asset would be harmful Threat An entity with the desire to deny the asset to the protector A force which could destroy, disrupt, or otherwise harm the asset
  • 13. For Nate and Cliff… Protector: Nate and the NOC Threat: “Hackers” Asset: Company information
  • 14. Back to the equation… Probability?
  • 15. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip
  • 16. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… Coin Flip Heads Tails
  • 17. Calculating probability “Of all the things than can happen, how likely is each one?” Universe as a box… The size of each “box” is the probability Strive for MECE Coin Flip Heads Tails Heads Tails Coin rolls away and is lost
  • 18. “You must not say ‘never.’ That is a lazy slurring-over of the facts. Actually, [risk analysis] predicts only probabilities. A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)
  • 19. Calculating probability Past data Events of concern / total events 3 successful attacks / 30,000 attempts = 0.0001 probability “Binning your gut” Low, Medium, High
  • 20. Remember: Probability must be calculated for BOTH Probability of an event Probability of an outcome GIVEN that the event has taken place
  • 21. Why does “valuation” matter? Some events are more concerning than others Death in a car accident Death in a plane crash Value of the (e,o) pair can be monetary, time based, goodwill based, whatever is of most concern
  • 31. Method 1: The Simple Chart THIS IS NOT A “RISK MATRIX”!
  • 32. Method 2: The Probabilistic Chart (Probability of event)*(Probability of outcome given event)
  • 33. Method 3: Annualized Loss Expectancy (Probability from last page)*(Loss from event)
  • 35. How to use a “Factor based Model” “Factor Based Models” provide a formula for quick and easy assessment of a range of items and rank ordering of them. WARNING: This system only provides a RELATIVE ranking of the items listed.
  • 36. How to use a “Factor based Model” Assign a range of numbers to each factor Try to use even ranges of numbers (1-4) Ensure that the higher the number, the more it points towards whatever the issue at hand is Evaluate each factor using that range Add up the combined score
  • 37. CARVER: Target Selection Criticality Accessibility Recoverability Vulnerability Effect Recognizability
  • 38. CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
  • 39. CARVER Analysis: The Next HOPE P: HOPE Staff | A: Enjoyment of attendees | T: Rouge attendee Scale: 1-6 6 = Contributes highly to attack success probability 1 = Does not contribute to attack success probability
  • 40. EVIL DONE: Target Selection Exposed Vital Iconic Legitimate Destructible Occupied Near Easy
  • 41. DSHARPP: Target Selection Demography Symbology History Accessibility Recuperability Population Proximity
  • 42. CRAVED: Attractiveness of Assets Concealable Removable Available Valuable Enjoyable Disposable
  • 43. MURDEROUS: Weapon Selection Multipurpose Undetectable Removable Destructive Enjoyable Reliable Obtainable Uncomplicated Safe
  • 44. ESEER: Facilitation of crime Easy Safe Excusable Enticing Rewarding
  • 45. HOPE: Ease of social engineering Hour of the day Oversight by manager Pressure Encouragement
  • 47. Scales are IMPORTANT Let’s assume a FBM of: A+B+C+D A: 1-4 Vulnerability B: $ of damages C: Time to return to operation (Seconds) D: Lives lost For: Ships? Buildings? Troops?
  • 48. Types of scales Nominal Binning, no order (apples, pears, oranges) Ordinal Hierarchical, no calculations (High, medium, low) Interval Hierarchy and calculations (1, 2, 4, 8, 16) Natural Interval with countable items (deaths, $, time)
  • 49. Let’s bring this all together Nate’s presentation
  • 50. Risk Analysis of Corporate Systems Presented by Nate
  • 51. Attackers are attempting to penetrate our network to steal, destroy or alter corporate data NOC has been tasked with securing against these attacks Problem at Issue
  • 52. Attacks over the last 3 years
  • 53. Andrews Co. Victim of a penetration, customer data leaked Loss of revenue from loss of goodwill: $2.4M Revenue dedicated to fixing systems: $10M TNH Inc. Victim of a lengthy Denial of Service attack Loss of revenue from inability to do business: $30M Revenue dedicated to upgrading systems: $12M Effects of attacks on other companies
  • 54. Implement an IDS Detects attacks $10,000 to install, $1,000/year in upkeep Tighten firewall Stops intruders $5,000 to install, $500/year in upkeep Install WEP at POS facilities Tightens security $10 in equipment & $5 in labor per facility ($10+$5)*50,000 = $750,000 No upkeep costs Recommendations
  • 55. Cost benefit analysis As we can see by the above numbers, by spending 766,500 this year we can mitigate the possible effects of an attack which (on average) will cost $15M. Thus, the loss will be approx. $14,233,500 less than without the recommended upgrades.
  • 57. The End (Of the presentation within a presentation)
  • 58. Remember these? Risk Assessment Risk management What can happen? How likely is it to happen? What are the consequences if it happens? What can be done? What are the benefits, costs and risks of each option? What are the impacts of each option on future options?
  • 59. Things to remember… Use common sense! If something looks wrong, it usually is Scope the question Don’t bite off more than you can chew Use proper scales Remember the 6 questions of risk FBMs are quick and easy, but be careful! Check your work! Academic integrity BEFORE making managers happy
  • 60. Questions? Full presentation (including slides, resources, audio & video): Blog.NickLeghorn.com
  • 61. “You must not say ‘never.’ That is a lazy slurring-over of the facts. Actually, [risk analysis] predicts only probabilities. A particular event may be infinitesimally probable, but the probability is always greater than zero.” Second Foundation (Isaac Asimov)