1 hour 39 minutes
This is risk management and information technology.
In this lesson we will learn about the quantitative risk assessment process, different quantitative calculations and analysis of the results.
In our previous lesson we discuss qualitative risk assessment. In this lesson we will discuss quantitative risk assessment, which is the calculation based risk assessment process that uses probability percentage to determine risk.
In quantitative risk assessment, we use dollar figures to determine levels of risk, potential loss, a cause of countermeasures, and the valley of safeguards. This allows management to determine the prioritization of risk management decisions.
This is an overview of the quantitative risk management process.
The risk assessment team determines the value of the asset that carries the risk.
Then they calculate exposure factor.
Then the risk assessors calculate the single loss expectancy,
then they assess the annual rate of occurrence,
then they derived the annualized loss expectancy.
After all the data is gathered and calculated. The risk assessment team performs a cost benefit analysis of the counter measures applied towards the risk.
After that overview let us deep dive into each step of the process.
The risk assessment team determines the asset value to each asset by assigning a dollar value to the asset.
An asset can be an existing inventory, hardware devices, structure or any property organization has
and organizations, reputations as customers and potential customers.
This valley is determined by the market and the demand of the asset.
We calculate exposure factor,
which is the potential loss and percentage of loss. If a threat is realized or a curse,
we didn't calculate for the single loss expectancy.
This is the exact amount of loss that organization would experience once the trade occurs.
This can be calculated using the exact, as soon as the asset value multiplied by the exposure factor.
For example, we have a data center with servers, equipment and personnel that is valid $100,000 with an exposure factor of 45%.
That's silly. Can be calculated at $45,000.
The annual rate of occurrence is expected frequency of the threat.
On an annual basis.
It can range from zero to a large number and is derived from historical records, statistics and industry data available to the risk of specimen team.
Then we calculate for the annualized loss expectancy, which is the yearly cost of all instances of realized threats.
This means the total cost of all risks that happened to the organization.
This is calculated as S. L. E. Multiplied by the arrow.
For example, we have an outage at the data center, which is where in a year and that will cost $25,000 for the currents.
Whereas losing the entire data center in a fire would cost organization $1.125 million.
Now let's talk about how quantitative risk assessment calculates risk.
The basic risk calculations. The annualized loss expectancy.
This is a daunting process that uses software modeling and automated tools that have predetermined asset valuations.
These valuations are basic geography,
industry and asset types.
We can also calculate for annualized loss expectancy with safeguard.
If the safeguard is implemented,
this is done by adding a line item for ellie. If a safeguard is implemented,
each exposure factor, an annualized rate of occurrence is specific to safeguard.
The safeguards should reduce the number of times that I just realized
and this is used in cost benefit analysis to help management make risk based decisions.
The safeguard cost includes purchase of the safeguard, implementation costs, licensing and customization.
The cost of deploying A safeguard should be lowered the national value of the asset.
The safeguard may also have annual costs, such as maintenance agreements, professional services or licensing fees, which is called the annual cost of safeguards.
This is done by determining the annual clause expectancy for both before and after implementing a safeguard and subtract the annual cost of the safeguard.
using fire retardant technology,
temperature sensors, smoke and fire alarms are applied to the data center we had discussed earlier.
They live for losing the entire data centers 1.125 million, which is derived from 45,000, which is the sle
multiply the number of service from our previous example,
If the safeguards are applied,
we can hypothetically reduced the damage of fire to localized part of the data center and potentially just lose five servers in the process,
Multiplied with a single loss expectancy rate of the data center. This results in $225,000.
The annual cost of safeguards provided by the hypothetical vendor in this case is an additional 25,000.
With this in mind we can calculate that the value of losing the entire data center is is at $1.125 million. And adding the safeguard costs. An annual cost of maintaining the solution is 875 thousands in savings. After applying the safeguards
from here, we can follow two rules. One is that if the result is negative, it is not a financial responsible choice,
but if the result is positive,
As we can see here, the annual savings is equal to return 75,000.
Finally, let's discuss the cost benefit of the safeguard.
The values that the analysts may come up with
do not necessarily reflect real world boss.
The value of each safeguard should be sorted from greatest to lowest to return. Prioritization of management
and in doing so, we should considered a security and operating budget and always consider the bottom line and the value of the benefit.
today's lesson, we discussed the quantitative risk analysis process.
We talked about the equations used in a quantitative risk analysis.
We also calculated the cost and benefit
and analyzed the results.
Thank you for completing this lesson.
Is this your instructor robert gown?
Certified Information Security Manager (CISM)
A CISM certification shows you have an all-around technical competence and an understanding of the ...
13 CEU/CPE Hours Available
Certificate of Completion Offered
Certified Information Systems Security Professional (CISSP) 2021
CISSP is the basis of advanced information assurance knowledge for information security professionals. Often referred ...
16 CEU/CPE Hours Available
Certificate of Completion Offered