SlideShare a Scribd company logo
Risk related
concepts II.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
PACE-IT.
– Qualitative vs. quantitative risk
assessments.
– Other risk calculation factors.
Page 4
Risk related concepts II.
Page 5
Many businesses dedicate a
fair amount of their
resources—both money and
time—to performing risk
assessments.
In most cases, the risk assessments may be broken into one of
two categories. They may be either qualitative or quantitative
assessments.
Qualitative assessments are conducted based on the probability,
or likelihood, of the risk occurring and the expected impact on the
business. This type of assessment is not really concerned about
the actual dollar impact.
Quantitative assessments are conducted based on the projected
cost in dollars if a risk event occurs.
Risk related concepts II.
Page 6
Risk related concepts II.
– Qualitative assessments.
» Basic formula: risk = probability/likelihood X loss/impact.
» Several tables are built using the variables of the formulas.
• A risk table outlines the possible events (e.g., a data breach
or hard drive failure).
• A probability/likelihood table outlines the possibility of the
event occurring (e.g., not likely, likely, or most likely) with a
value assigned to the likelihood.
• A loss/impact table outlines the impact to the business if the
event occurs (e.g., minor, medium, or major) with a value
assigned to the loss.
» The tables are used collectively to create the qualitative risk
assessment.
» Often, qualitative assessments are used to determine which
assets and risks require a quantitative risk assessment.
• Quantitative risk assessments require more time and effort.
Page 7
Risk related concepts II.
– Quantitative assessments.
» Involve using the actual cost of a threat event to help determine
how much to spend on preventative measures.
• It doesn’t make sense to spend more than the actual cost.
» Quantitative risk assessments can help when budgeting for a
security solution to reduce the risk of occurrence.
• Step 1: determine the value of the asset (may be the cost to
replace, the cost of downtime, etc.).
• Step 2: determine the exposure factor (EF)—the cost of a
threat event expressed as a percentage of the value of the
asset.
• Step 3: determine the single loss expectancy (SLE)—the
value multiplied by the EF.
• Step 4: determine the average rate of occurrence (ARO)—
the number of times the threat event is estimated to occur
each year.
• Step 5: determine the average loss expectancy (ALE)—the
SLE multiplied by the ARO.
• Step 6: determine what security solution (that falls below the
ALE) will mitigate the risk.
Page 8
Risk related concepts II.
Page 9
Risk related concepts II.
– MTTF (mean time to fail).
» The average time a device is expected to be operational in
production before it fails—usually as reported by the
manufacturer (non-recoverable occurrence).
– MTBF (mean time between failures).
» The average time between failures of a system or device.
– MTTR (mean time to restore/recover).
» The average time required to restore or recover when a failure
occurs.
– RTO (recovery time objective).
» The amount of allowable time before a system or device can be
down (e.g., one hour, 24 hours, or 15 minutes).
– RPO (recovery point objective).
» Represents the portion of the system that is expected to be
recovered after a failure (e.g., all of it or from the point of last
backup).
Page 10
Risk related concepts II.
Qualitative risk assessments are subjective assessments based on the
likelihood of occurrence and the expected impact (risk = likelihood X
impact). Quantitative risk assessments require more resources to conduct,
but put an expected dollar amount on a risk event (ALE = SLE X ARO).
Quantitative assessments can be used to determine how much money can
be spent on mitigation.
Topic
Qualitative vs. quantitative
risk assessments.
Summary
When conducting a quantitative risk assessment, there are some factors
that may come into the cost equations. They include: MTTF, MTBF, MTTR,
RTO, and RPO.
Other risk calculation factors.
Page 11
THANK YOU!
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

PPTX
PACE-IT, Security+ 2.5: Incident Response Concepts
PPTX
PACE-IT, Security+2.9: Goals of Security Controls
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PPTX
PACE-IT, Security+2.8: Risk Management Best Practices
PPTX
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+2.9: Goals of Security Controls
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+2.8: Disaster Recovery Concepts
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls

What's hot (20)

PPTX
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
PACE-IT, Security+1.3: Cloud Concepts
PPTX
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PPTX
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
PACE-IT, Security+2.6: Security Related Awareness and Training
PPTX
PACE-IT, Security+3.4: Summary of Wireless Attacks
PPTX
PACE-IT: Risk and Security Related Concepts
PPTX
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PPTX
PACE-IT: Basic Forensic Concepts
PPTX
PACE-IT: Common Threats (part 2)
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PPTX
PACE-IT: IT Security Measures
PPTX
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PPTX
Pace IT - Common Security Threats
PPTX
PACE-IT: Common Network Security Issues
PPTX
PACE-IT, Security+1.2: Secure Network Administration Concepts
PPTX
PACE-IT: Common Threats (part 1)
PPTX
PACE-IT: Securing the Workstation
PACE-IT, Security+1.3: Secure Network Design Elements and Components
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+1.3: Cloud Concepts
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT: Risk and Security Related Concepts
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT: Basic Forensic Concepts
PACE-IT: Common Threats (part 2)
PACE-IT, Security+3.2: Summary of Types of Attacks (part 1)
PACE-IT: IT Security Measures
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT - Common Security Threats
PACE-IT: Common Network Security Issues
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT: Common Threats (part 1)
PACE-IT: Securing the Workstation
Ad

Viewers also liked (17)

PPTX
El hombre y la ciudad
PDF
Groupe somavrac 2016
DOCX
Actividades
PPT
2016 -- Ukrainian Presentation -- Final
PDF
Final presentation ga mw copy
PDF
La paradoja
PPT
Drupal Gardens Tutorial 2 of 4
PPTX
Tehran's 2nd Android bootcamp
PDF
Les plantes per Aitor i Toni
PDF
CV saman seyedgholizade
PDF
Rodolins amb el nostre nom
PPTX
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
PDF
ใบงานที่ 4
PPTX
Teacher development
PPTX
NY Web Perf Meetup: Peeling the Web Performance Onion
PDF
Sant antoni
El hombre y la ciudad
Groupe somavrac 2016
Actividades
2016 -- Ukrainian Presentation -- Final
Final presentation ga mw copy
La paradoja
Drupal Gardens Tutorial 2 of 4
Tehran's 2nd Android bootcamp
Les plantes per Aitor i Toni
CV saman seyedgholizade
Rodolins amb el nostre nom
PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)
ใบงานที่ 4
Teacher development
NY Web Perf Meetup: Peeling the Web Performance Onion
Sant antoni
Ad

Similar to PACE-IT, Security+ 2.1: Risk Related Concepts (part 2) (20)

PPTX
Crash Course: Managing Cyber Risk Using Quantitative Analysis
PPTX
NIST 800 30 revision Sep 2012
DOCX
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
PDF
Risk management standard_030820
PDF
Risk management standard_030820
PDF
Risk management standard
PDF
Risk management standard_030820
PDF
Risk management standard_030820
PDF
IS-Risk-Management-Lecture-2.pdf
PDF
Healthcare Risk Analytics Power Of Knowledge Us Captive
PDF
Risk And Threat Assessment
DOCX
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
PDF
Data Driven Risk Management
DOCX
Risk Management Insight FAIR(FACTOR AN.docx
PPTX
Module 3 - BCA - Introduction of Security Fundamental.pptx
PPT
05-risk_assesment.ppt
PPT
1. security management practices
DOCX
Risk Management Insight FAIR(FACTOR ANA.docx
PDF
Understanding enterprise risk management and fair
PPTX
Risk Management / Information Security
Crash Course: Managing Cyber Risk Using Quantitative Analysis
NIST 800 30 revision Sep 2012
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
Risk management standard_030820
Risk management standard_030820
Risk management standard
Risk management standard_030820
Risk management standard_030820
IS-Risk-Management-Lecture-2.pdf
Healthcare Risk Analytics Power Of Knowledge Us Captive
Risk And Threat Assessment
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Data Driven Risk Management
Risk Management Insight FAIR(FACTOR AN.docx
Module 3 - BCA - Introduction of Security Fundamental.pptx
05-risk_assesment.ppt
1. security management practices
Risk Management Insight FAIR(FACTOR ANA.docx
Understanding enterprise risk management and fair
Risk Management / Information Security

More from Pace IT at Edmonds Community College (20)

PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PPTX
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PPTX
PACE-IT, Security + 5.3: Security Controls for Account Management
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PPTX
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PPTX
PACE-IT, Security + 5.1: Summary of Authentication Services
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PPTX
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PPTX
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PPTX
PACE-IT, Security+3.6: Security Enhancement Techniques
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PPTX
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PPTX
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PPTX
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.1: Types of Malware

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Anesthesia in Laparoscopic Surgery in India
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Final Presentation General Medicine 03-08-2024.pptx
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
STATICS OF THE RIGID BODIES Hibbelers.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Basic Mud Logging Guide for educational purpose
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
RMMM.pdf make it easy to upload and study
102 student loan defaulters named and shamed – Is someone you know on the list?
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Structure & Organelles in detailed.
Anesthesia in Laparoscopic Surgery in India

PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 PACE-IT. – Qualitative vs. quantitative risk assessments. – Other risk calculation factors.
  • 4. Page 4 Risk related concepts II.
  • 5. Page 5 Many businesses dedicate a fair amount of their resources—both money and time—to performing risk assessments. In most cases, the risk assessments may be broken into one of two categories. They may be either qualitative or quantitative assessments. Qualitative assessments are conducted based on the probability, or likelihood, of the risk occurring and the expected impact on the business. This type of assessment is not really concerned about the actual dollar impact. Quantitative assessments are conducted based on the projected cost in dollars if a risk event occurs. Risk related concepts II.
  • 6. Page 6 Risk related concepts II. – Qualitative assessments. » Basic formula: risk = probability/likelihood X loss/impact. » Several tables are built using the variables of the formulas. • A risk table outlines the possible events (e.g., a data breach or hard drive failure). • A probability/likelihood table outlines the possibility of the event occurring (e.g., not likely, likely, or most likely) with a value assigned to the likelihood. • A loss/impact table outlines the impact to the business if the event occurs (e.g., minor, medium, or major) with a value assigned to the loss. » The tables are used collectively to create the qualitative risk assessment. » Often, qualitative assessments are used to determine which assets and risks require a quantitative risk assessment. • Quantitative risk assessments require more time and effort.
  • 7. Page 7 Risk related concepts II. – Quantitative assessments. » Involve using the actual cost of a threat event to help determine how much to spend on preventative measures. • It doesn’t make sense to spend more than the actual cost. » Quantitative risk assessments can help when budgeting for a security solution to reduce the risk of occurrence. • Step 1: determine the value of the asset (may be the cost to replace, the cost of downtime, etc.). • Step 2: determine the exposure factor (EF)—the cost of a threat event expressed as a percentage of the value of the asset. • Step 3: determine the single loss expectancy (SLE)—the value multiplied by the EF. • Step 4: determine the average rate of occurrence (ARO)— the number of times the threat event is estimated to occur each year. • Step 5: determine the average loss expectancy (ALE)—the SLE multiplied by the ARO. • Step 6: determine what security solution (that falls below the ALE) will mitigate the risk.
  • 8. Page 8 Risk related concepts II.
  • 9. Page 9 Risk related concepts II. – MTTF (mean time to fail). » The average time a device is expected to be operational in production before it fails—usually as reported by the manufacturer (non-recoverable occurrence). – MTBF (mean time between failures). » The average time between failures of a system or device. – MTTR (mean time to restore/recover). » The average time required to restore or recover when a failure occurs. – RTO (recovery time objective). » The amount of allowable time before a system or device can be down (e.g., one hour, 24 hours, or 15 minutes). – RPO (recovery point objective). » Represents the portion of the system that is expected to be recovered after a failure (e.g., all of it or from the point of last backup).
  • 10. Page 10 Risk related concepts II. Qualitative risk assessments are subjective assessments based on the likelihood of occurrence and the expected impact (risk = likelihood X impact). Quantitative risk assessments require more resources to conduct, but put an expected dollar amount on a risk event (ALE = SLE X ARO). Quantitative assessments can be used to determine how much money can be spent on mitigation. Topic Qualitative vs. quantitative risk assessments. Summary When conducting a quantitative risk assessment, there are some factors that may come into the cost equations. They include: MTTF, MTBF, MTTR, RTO, and RPO. Other risk calculation factors.
  • 12. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.