Unit Outline Quantitative Risk Analysis Module 1: Quantitative Risk Analysis Module 2: Case Study Module 3: Cost Benefit Analysis and Regression Testing Module 4: Modeling Uncertainties Module 5: Summary Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Module 1 Quantitative Risk Analysis Quantitative Risk Analysis Learning Objectives • Students should be able to: – Define quantitative risk analysis – Recognize the steps involved in such a risk analysis – Determine Likelihood of Exploitation – Identify Risk Exposure – Compute Annual Loss Expectancy (ALE) Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 3 Quantitative Risk Analysis Risk Analysis Definition • Risk analysis involves the identification and assessment of the levels of risks calculated from the known values of assets and the levels of threats to, and vulnerabilities of, those assets. • It involves the interaction of the following elements: – – – – – – Assets Vulnerabilities Threats Impacts Likelihoods Controls Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 4 Quantitative Risk Analysis Risk Analysis Concept Map • Threats exploit system vulnerabilities which expose system assets. • Security controls protect against threats by meeting security requirements established on the basis of asset values. Source: Australian Standard Handbook of Information Security Risk Management – HB231-2000 Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 5 Quantitative Risk Analysis Definitions • Quantitative risk analysis methods are based on statistical data and compute numerical values of risk • By quantifying risk, we can justify the benefits of spending money to implement controls. • It involves three steps – Estimation of individual risks – Aggregation of risks – Identification of controls to mitigate risk Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 6 Quantitative Risk Analysis Risk Analysis Steps Security risks can be analyzed by the following steps: • Identify and determine the value of assets • Determine vulnerabilities • Estimate likelihood of exploitation – Compute frequency of each attack (with & w/o controls) using statistical data • Compute Annualized Loss Expectancy – Compute exposure of each asset given frequency of attacks • Survey applicable controls and their costs • Perform a cost-benefit analysis – Compare exposure with controls and without controls to determine the optimum control Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 7 Quantitative Risk Analysis Determining Assets & Vulnerabilities • Identification of Assets and Vulnerabilities is the same for both Qualitative and Quantitative Risk Analysis • The differences in both of these is in terms of valuation: – Qualitative Risk Analysis is more subjective and relative – Quantitative Risk Analysis is based on actual numerical costs and impacts. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 8 Quantitative Risk Analysis Likelihood of Exploitation • Likelihood relates to the stringency of existing controls – i.e. likelihood that someone or something will evade controls • Several approaches to computing probability of an event – classical, frequency and subjective • Probabilities hard to compute using classical methods – Frequency can be computed by tracking failures that result in security breaches or create new vulnerabilities can be identified – e.g. operating systems can track hardware failures, failed login attempts, changes in the sizes of data files, etc. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 9 Quantitative Risk Analysis Likelihood of Exploitation • Difficult to obtain frequency of attacks using statistical data. Why? – Data is difficult to obtain & often inaccurate • If automatic tracking is not feasible, expert judgment is used to determine frequency • Approaches – Delphi Approach: Probability in terms of integers (e.g. 1-10) – Normalized: Probability in between 0 (not possible) and 1 (certain) Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 10 Quantitative Risk Analysis Delphi Approach Frequency Ratings More than once a day 10 Once a day 9 Once every three days 8 Once a week 7 Once in two weeks 6 Once a month 5 Once every four months 4 Once a year 3 Once every three years 2 • Subjective probability technique originally devised to deal with public policy decisions • Assumes experts can make informed decisions • Results from several experts analyzed • Estimates are revised until consensus is reached among experts Less than once in three years 1 Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 11 Quantitative Risk Analysis Risk Exposure • Risk is usually measured as $ per annum and is quantified by risk exposure. – ALE (Annual Loss Expectancy, expressed as: $/year) • If an event is associated with a loss – LOSS = RISK IMPACT ($) • The probability of an occurrence is in the range of: – 0 (not possible) and 1 (certain) • Quantifying the effects of a risk by multiplying risk impact by risk probability yields risk exposure. – RISK EXPOSURE = RISK IMPACT x RISK PROBABILITY Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 12 Quantitative Risk Analysis Intangible Assets • Incorporating intangible assets within Quantitative Risk Analysis is difficult as it is hard to put a price on things such as trust, reputation, or human life. • However, it is necessary to put an as accurate a value as possible when factoring these assets within risk analysis as they may be even more important than tangible assets. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 13 Quantitative Risk Analysis Computing ALE • Single Loss Expectancy: Loss to an asset if event occurs – Value of the lost asset = Ci – Impact on the Asset (if event occurs) = Pi – SLE = Ci * Pi • Annualized Rate of Occurrence (ARO) characterizes, on an annualized basis, the frequency with which a threat is expected to occur. • Annualized Loss Expectancy (ALE) computes risk using the probability of an event occurring over one year. • Formulation – ALE = (SLE)(ARO) Source: Handbook of Information Security Management, Micki Krause and Harold F. Tipton Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 14 Quantitative Risk Analysis Example #1: Gym Locker Scenario: There is a gym locker used by its members to store clothes and other valuables. The lockers cannot be locked, but locks can be purchased. You need to determine: 1) Risk exposure for gym members 2) Controls to reduce risk Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 15 Quantitative Risk Analysis Example #1: Gym Locker, cont’d. • Identify assets and determine value – – – – – – – – Clothes Wallet Glasses Sports equipment Driver’s license Car keys House keys Tapes and walkman – Total Loss/week: $50 $100 $100 $30 $20 $100 $60 $40 ____ $500 • Find vulnerability – – – – Theft Accidental loss Disclosure of information (e.g. read wallet) Vandalism Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 16 Quantitative Risk Analysis Example #1: Gym Locker, cont’d. • Estimate likelihood of exploitation – – – – – 10 (more than once a day) 9(once a day) 7 (once a week) 6 (once every two weeks) 5 (once a month) – – – – 4 (once every four months) 3 (once a year) 2 (once every three years) 1 (less than once every 3 years) • For theft: estimated likelihood is 7 • Figure annual loss: – ~$500 worth of loss each week – ~52 weeks in a year – ~$26,000 loss per year Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 17 Quantitative Risk Analysis Example #1: Gym Locker, cont’d. • Determine cost of added security – New lock $5 – Replacement for lost key $10 – On average members lose one key twice a month (24 times per year) • Estimate likelihood of exploitation under added security – The new likelihood of theft could be estimated at a 4. • Cost Benefit Analysis – Revised Losses (including cost of controls) = (500 * 4) + (15*24) = 2360 – Net savings = 26000 – 2360 = 23640 Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 18 Quantitative Risk Analysis Example #2: Hard Drive Failure • The chance of your hard drive failing is once every three years – Probability = 1/3 • Intrinsic Cost – $300 to buy new disk • Hours of effort to reload OS and software – 10 hours • Hours to re-key assignments from last backup – 4 hours • Pay per hour of effort – $10.00 per hour • Total loss (risk impact) – $300 + 10 x (10+4) = $440 • Annual Loss Expectancy (pa = per annum) – (440 x 1/3)$pa = $147 pa Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 19 Quantitative Risk Analysis Example #3: Virus Attack • Situation: Virus Attack on same system – You frequently swap files with other people, but have no anti-virus software running. – Assume an attack every 6 months (Probability = 2 per year) – No need to buy a new disk – Rebuild effort (10 + 4) hours – Total loss = $10 x (10 + 4) = $140 – ALE = ($140 x 2) $pa = $280 pa Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 20 Quantitative Risk Analysis Summary • Quantitative risk analysis involves statistical data and numerical values and can be used to justify the benefit of controls. • While asset and vulnerability identification are the same for qualitative and quantitative methods, qualitative is more subjective and quantitative is more absolute. • Probabilities can be calculated in multiple ways. This can be done using calculated values or the Delphi Approach (1-10) and a Normalized Approach (1,0), which are more subjective. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 21