This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Cyber risk quantification involves the application of risk quantification techniques to an organization's cybersecurity risk. Cyber risk quantification is the process of evaluating the cyber risks that have been identified and then validating, measuring and analyzing the available cyber data using mathematical modeling techniques to accurately represent the organization's cybersecurity environment in a manner that can be used to make informed cybersecurity infrastructure investment and risk transfer decisions. Cyber risk quantification is a supporting activity to cybersecurity risk management; cybersecurity risk management is a component of enterprise risk management and is especially important in organizations and enterprises that are highly dependent upon their information technology (IT) networks and systems for their business operations.
One method of quantifying cyber risk is the value-at-risk (VaR) method that is discussed at the January 2015 World Economic Forum meeting.[1] At this meeting, VaR was studied and researched and deemed to be a viable method of quantifying cyber risk.
Practical Implementations
editCyber risk quantification has been used in a variety of practical applications, including:
Mathematical definition
editThe mathematical definition of Cyber-Risk is as follows:
- Cyber-Risk = 1 - Cyber-Confidence
'Cyber-Confidence' is / are the actual executed tests which have passed. This value can be converted to a statistical probability & the associated Cyber-Risk calculated:
- Example-1: 'A certain number' of tests have been executed & passed. Let's imagine that it yields a Defect-Free Confidence of 97.43%. Answer: Cyber-Risk = 2.57%.
- Example-2: All 65,536 TCP ports & 65,536 UDP ports are confirmed to be dead or inactive on an asset; how resistant to penetration is it ? Answer: Cyber-Confidence = 99.83%, Cyber-Risk = 0.17%
Typically, this form of Cyber-Confidence &/or Cyber-Risk estimation is termed Testimation because:
- It can be applied to estimate the number of tests required for any desired level of Cyber-Confidence
- It can be applied to estimate the Cyber-Confidence (& Cyber-Risk) based upon the number of tests which have actually been executed & passed
See also
editReferences
edit- ^ "New Framework to Help Companies Calculate Risk of Cyberattacks". Archived from the original on September 28, 2016.
- ^ Orlando, Albina (2021). "Cyber Risk Quantification: Investigating the Role of Cyber Value at Risk". Risks. 9 (10): 184. doi:10.3390/risks9100184. hdl:10419/258268.
- ^ Alsaleh, Mohammed Noraden; Husari, Ghaith; Al-Shaer, Ehab (2016). "Optimizing the RoI of cyber risk mitigation". 2016 12th International Conference on Network and Service Management (CNSM). pp. 223–227. doi:10.1109/CNSM.2016.7818421. S2CID 16037703.
- ^ Alsaleh, Mohammed Noraden; Al-Shaer, Ehab; Husari, Ghaith (2017). "ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration". Journal of Network and Systems Management. 25 (4): 759–783. doi:10.1007/s10922-017-9428-x. S2CID 20994581.
- ^ De Corniere, Alexandre; Taylor, Greg (August 2021). "A Model of Information Security and Competition". SSRN 3928754. Archived from the original on October 26, 2021.
- ^ "Guide to NIST Risk Assessments". www.securityscientist.net. Security Scientist. March 7, 2023. Retrieved March 10, 2023.