SlideShare a Scribd company logo
1 of 42
Download to read offline
Phillip Banks PE, CPP © The Banks Group Inc. - 2017
“If we don’t understand vulnerability we
won’t understand risk.”
Unknown
“Risk management is a systematic response
to uncertainty.”1
1CSE/RCMP Harmonized Threat and Risk Assessment Methodology, October 23rd, 2007
Risk
Is a person or situation
that poses a possible
threat to the security of
something.
The effect of
uncertainty on
objectives1.
Vulnerability
Is a weakness or gap in
a security protections,
control measures or
processes that can be
exploited by an
adversary to remove,
damage or destroy an
asset.
1Risk Management Principles and Guidelines, AS NZS ISO 31000:2009
Risk has three key characteristics1:
It looks ahead into the future;
There is an element of uncertainty e.g. a
condition or a situation exists that might
cause a problem for the project in the future;
It is related to the outcome.
1Project Complexity and Risk Assessment Tool, Version 1.4,. Treasury Board of Canada Secretariat
Risk = P x I
Risk = P x I x V
Risk = PA (1 – PI) C
Risk = P x I x M
Risk = Probability x Impact
Security Controls
Risk = P X E (Exploitability of Protection)
Adversary?
Threat(s)?
Adversary
Objectives?
Capabilities
and Strengths?
Adversary
Determination?
Knowledge,
Training and
Experience?
Timeline?
???????
© The Banks Group Inc. - 2016
Risk is never static.
Risk can be within or outside
our sphere of control.
Risk is affected by both the
adversary and the target.
A convertible asset requires
multi-stage “risk continuum”
consideration.
What can be done to positively
affect the “risk triangle”?
Corporate “Risk Appetite”?
Probability
Quantifiable Risk
Risk we can precisely measure
and record with numbers:
How many security controls are
present?
Is the control strength rated?
How many attacks per day do we
see?
How many times did this happen
in the past?
How many vulnerabilities exist?
etc.
Qualifiable Risk
Risk we have an idea about
but can't accurately measure
and is thus subjective:
How confident are we with the
code-base?
Do we think the project has had
sufficient review?
Do we think this control is
efficient?
etc.
Possibility – An event
that could occur.
Probability – The
likelihood of the event
occurring.
A “possibility” is any event which has a
“probability” of occurrence which is greater
than “0”.
A threat-event will take
place?
The threat-event will be
mitigated to some degree?
The adversary will be 100%
successful?
What probability?
Impossible?
Even Chance?
Certain?
Historical record
Anecdotal info
Police sources
Industry sources
Networking
Credible intelligence
Security technology
inputs
Industry experience
…………………….?
Probability of a six being
on the upper surface of
one dice…?
Probability of two sixes
being on the upper
surface of two dice…?
Probability of three sixes
being on the upper
surface of three dice…?
A system with three
components fails if one
or more components fail.
The probability that any
given component will fail
is 1/10.
What is the probability
that the system will fail?
Business impact analysis
S.W.O.T analysis
Past experience
Risk manager
In-house counsel
Public relations
Employees
Etc...
Probability
Impact
Critical
Medium
Low
High
• R = Risk to the facility of an adversary gaining access to
assets (ranges from 0 to 1.0).
• PA = Probability of an adversary attack during a period of
time.
• PE = Probability of Preventing the Event.
• = P(I) INTERUPTION x P(N) NEUTRALIZATION
• C = Consequence Value.
Note: If PE is the probability of preventing the event then [1-PE] must be the
probability of the adversary being successful
R = PA * [1-(PE)] *C
* The Design and Evaluation of Physical Security Systems, Garcia, Mary Lynn, Butterworth-Heinemann, 2001
Risk = Probability Vulnerability Impact
Vulnerabilities are
always present?
Vulnerabilities are not
static.
Vulnerabilities
become transparent
if not treated.
Vulnerabilities are
measurable.
Control Measures
Vulnerability Parameters?
What is vulnerable?
Why is it vulnerable?
What makes it vulnerable?
Is the vulnerability easily exercised?
Can the vulnerability be mitigated?
Management and Measurement
Identify vulnerabilities.
Establish parameters.
Identify options.
Implement options.
Measure outcome.
Remediate as required.
Monitor and report.
Vulnerability Register.
Vulnerability
Vulnerability
Type
Threat
Relationship
Dependency
?
Remediation
WHAT IS IT? P, P or T
Tailgating People Daily Operations
Access
Management
Protocol
Education and
Awareness,
Signage, Anti-
Passback
Pareto Analysis
Pair-wise Comparison
Fault Tree Analysis
Attack Tree Analysis
Failure Mode & Effect Analysis
Failure Modes, Effects & Criticality
Analysis
C.A.R.V.E.R (modified)
Cause & Effect (Ishikawa)
Monte Carlo Simulation
_____________________?
Qualitative vs Quantitative
Fit-for-Purpose:
A protection/control measure which is
formally selected and mitigates the
known and reasonably foreseeable
threats.
State-of-Readiness:
A protection/control measure which is
implemented, operated, maintained and
demonstrably capable of mitigating
known or reasonably foreseeable
threats.
Rating
Fit-for-Purposes
Scoring Rationale
5
Protection selected based on
recognized standard or leading
practice. A formal performance
level was identified and is still
being met or exceeded.
3
Protection not specifically
appropriate for the threat,
operational or functional
environment or it is only nominally
achieving the required level of
performance.
1
Protection is inappropriate for
threat, operational or functional
environment or is not meeting a
required level of performance.
Rating
State-of-Readiness
Scoring Rationale
5
Protection is functioning as
designed and is operational in all
respects. There is little or no
down-time and there is no record
of it being compromised.
3
Protection is primarily functioning
as designed although there is
occasional down-time due to loss-
of-service or periodic break-
down.
1
Protection is not functioning or
not being in a State-of-Readiness
due to periodic loss-of-service or
break-down.
Fit-for-Purpose and State-of-Readiness ratings are
independent so the overall rating is the product of the
two.
A protection which is both fully Fit-for-Purpose and in
a complete State-of-Readiness should achieve a score
of 25.
If the assessor believes Fit-for-Purpose = 5 but the
State-of-Readiness = 3 then the overall rating of the
protection is 15 or 60% effective and it has a
vulnerability level of 40%.
1. Develop the protection design to meet
DBT.
2. Identify appropriateelements of the
design.
3. Identify how protection system will be
evaluated for effectiveness over time.
Characteristic Insider Criminal Organized Crime
Objective Steal assets such as tools, parts. Steal large quantity of valuable assets. Steal large quantities of finished product.
Motivation Personal gain, revenge. Personal gain. Large gain for criminal organization.
Base Enhanced Base Enhanced Base Enhanced
Planning/System
Knowledge
Good depending on
position.
Significant. Some, opportunistic.
Significant if in
collusion with
insider.
Good to high level.
Extensive
information and
level of access.
Weapons None Edged weapons Edged weapons
Hand guns, shot
guns
Unlikely
Wide array of
weapons
Tools and Equipment
Access keys or
credentials.
Access keys,
credentials &
combinations.
Hand tools or readily
available tools at the
facility.
Hand and power
tools.
Hand tools or
readily available
tools at the facility.
Access keys,
credentials and
combinations. Hand
and power tools.
Contaminants N/A N/A N/A N/A N/A N/A
IMPACT (damage) to
Asset(s)
Minimal Notable Notable Significant
Notable to
Significant
Significant to Critical
Injury to Persons No
Possible but
unintentional
Possible but
unintentional
Possible
Possible but
unintentional
Possible and
intentional
Fatalities No No No
Possible but
unintentional
Possible but
unintentional
Possible and
intentional
1The Design and Evaluation of Physical Protection Systems, Mary Lynn Garcia, Sandia National Laboratories, Albuquerque, New Mexico, Butterworth- Heinemann, 2001
Define the Context – Measuring What?
Identify all contributing security
element(s).
Use known or reasonably foreseeable
threat(s).
Step through the process and assign
scores – Does it make sense?
Team approach/peer review.
Protection Deter Deny Detect Delay Respond Protection
Score
%
Cont.
Comments
Fence 3 3 0 3 0 9 11
Bldg Const. 5 5 0 5 0 15 19
AM & IDS 1 3 5 3 3 15 19
CCTV 3 1 5 0 5 14 18
Sec Guards 5 3 3 3 5 19 24
Employees 1 0 3 0 3 7 9
18 15 16 14 16
Actual Score = 79
Possible Score = 115
Overall Effectiveness = 69%
PROBABILITY
IMPACT
VULNERABILITY
1. Collecting, recording and analyzing
information and data to develop security
intelligence.
2. Networking and contact development.
3. Modeling and threat forecasting
1. Business impact analysis.
2. Identification of critical structures,
operations and people.
3. Implementation and maintenance of
organizational resilience.
1. Criticality analysis.
2. Threat and threat event identification.
3. Vulnerability analysis e.g. Pareto, CARVER
& Monte Carlo Simulation etc.
4. Vulnerability assessment and reduction.
Practice risk management or become
very good at crisis management.
Your choice…..
Risk
Management
Crisis
Management?
Phillip Banks PE, CPP
The Banks Group Inc.
#4 – 1310 Wilkinson Road
Comox, British Columbia
Canada
V9M 0B3
604.762.5852
pbanks@thebanksgroup.ca www.thebanksgroup.ca
© The Banks Group Inc. - 2017
Protection of Assets Manual, ASIS International
Industry Guidelines on a Framework for Risk Related Decision Support, UKOOA, 1999
GRiP – A flexible approach for calculating risk as- a function of consequence, vulnerability and Threat, R.G. Whitfield, W.A.
Beuhring and G.W. Bassett, Argon National Laboratory, ANL/DIS -113, Decision and Information Services Division, January 2011.
Maturity Framework for Assuring Resiliency Under Stress, Carnegie-Mellon University, Don O’Neill, 2008
Pareto-Optimal Situation Analysis for Selection of Security Measures, Andres Ojamaa, Enn Tyugu, Jyri Kivimaa, IEEE, 2008
Concept of Vulnerability in Chemical Plants, Journal of Chemical & Pharmaceutical Research, 6(7); 1448-1454, Dongfen Zhao, Su
Hu, Cong An, Shuang Chen, Yifei Meng - 2004
Quantified Risk is a Weak Hypothesis, “A critical survey of results and assumptions”, Vilhelm Verendel, Chalmers University, 2009
General Security Risk Assessment Guideline, ASIS International Guidelines Committee, 2003
Indicators and criteria for measuring vulnerability: Theoretical Basis and Requirements, Jӧrn Birkmann, 2006
Defining and assessing quantifying security risk measures using vulnerability lifecycle and CVSS metrics, Hyun Chul Jon and
Yashwant K. Malaiya, Colorado State University, Fort Collins, Colorado, USA, 2011
Risk Analysis and the Security Survey, Third Edition, James F. Broder, CPP, Butterworth-Heinemann, 2006
AS/NZS ISO 31000:2009 Standard, Risk Management Principles and Guidelines (Superseding AS/NZS4360:2004)
AS/NZS HB 167:2006 Security Risk Management Standard Handbook
The Design and Evaluation of Physical Protection Systems, Mary-Lynn Garcia, Sandia National Laboratories, 2001
Risk Assessment and Management for Critical Asset Protection (RAM-CAP), ASME Innovative Technologies Institute LLC,
Washington, DC, 2004
Business Risk Assessment, David McNamee, The Institute of Internal Auditors, 1998
w3.epa.gov, Defining Risk Characterization
http://www.algebra.com/algebra/homework/Probability-and-statistics/Probability-and-statistics.faq.question.419808.html

More Related Content

What's hot

Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Indohaan Technology
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
SlideTeam
 

What's hot (20)

Introduction to Risk Management
Introduction to Risk ManagementIntroduction to Risk Management
Introduction to Risk Management
 
Safety Culture
Safety CultureSafety Culture
Safety Culture
 
Improve Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 StepsImprove Your Risk Assessment Process in 4 Steps
Improve Your Risk Assessment Process in 4 Steps
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Risk management
Risk managementRisk management
Risk management
 
PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005PECB Webinar: Risk Treatment according to ISO 27005
PECB Webinar: Risk Treatment according to ISO 27005
 
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
Risk Appetite & Risk Tolerance: Improving their application from Abstract to ...
 
Risk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation SlidesRisk Management Process And Procedures PowerPoint Presentation Slides
Risk Management Process And Procedures PowerPoint Presentation Slides
 
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...Behaviour-based safety (BBS) is the “application of science of behaviour chan...
Behaviour-based safety (BBS) is the “application of science of behaviour chan...
 
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain timesPECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
PECB Webinar: ISO 31000 - The Benchmark for Risk Management in uncertain times
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Deloitte risk committee guidance
Deloitte risk committee guidanceDeloitte risk committee guidance
Deloitte risk committee guidance
 
Safety Management System
Safety Management SystemSafety Management System
Safety Management System
 
Behavior Based Safety
Behavior Based Safety Behavior Based Safety
Behavior Based Safety
 
Fundamentals Of Risk Management
Fundamentals Of Risk ManagementFundamentals Of Risk Management
Fundamentals Of Risk Management
 
Life Saving Rules - HSE
Life Saving Rules - HSELife Saving Rules - HSE
Life Saving Rules - HSE
 
Operational risk management and measurement
Operational risk management and measurementOperational risk management and measurement
Operational risk management and measurement
 
Risk management
Risk managementRisk management
Risk management
 
Building an effective safety culture edits
Building an effective safety culture editsBuilding an effective safety culture edits
Building an effective safety culture edits
 
Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides Risk Assessment PowerPoint Presentation Slides
Risk Assessment PowerPoint Presentation Slides
 

Similar to Relating Risk to Vulnerability

Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
ClintonKelvin
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
Emerson Exchange
 

Similar to Relating Risk to Vulnerability (20)

Crash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative AnalysisCrash Course: Managing Cyber Risk Using Quantitative Analysis
Crash Course: Managing Cyber Risk Using Quantitative Analysis
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptxCybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
R af d
R af dR af d
R af d
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Project risk analysis
Project risk analysisProject risk analysis
Project risk analysis
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
Risk bridges business and security
Risk bridges business and securityRisk bridges business and security
Risk bridges business and security
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
Data Driven Risk Management
Data Driven Risk ManagementData Driven Risk Management
Data Driven Risk Management
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 

More from Resolver Inc.

More from Resolver Inc. (20)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Security Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk ManagementSecurity Trends: From "Silos" to Integrated Risk Management
Security Trends: From "Silos" to Integrated Risk Management
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Data Driven Risk Assessment
Data Driven Risk AssessmentData Driven Risk Assessment
Data Driven Risk Assessment
 
How to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business ResilienceHow to Achieve a Fully Integrated Approach to Business Resilience
How to Achieve a Fully Integrated Approach to Business Resilience
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)An Intro to Resolver's InfoSec Application (RiskVision)
An Intro to Resolver's InfoSec Application (RiskVision)
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
lizamodels9
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 

Relating Risk to Vulnerability

  • 1.
  • 2. Phillip Banks PE, CPP © The Banks Group Inc. - 2017
  • 3. “If we don’t understand vulnerability we won’t understand risk.” Unknown “Risk management is a systematic response to uncertainty.”1 1CSE/RCMP Harmonized Threat and Risk Assessment Methodology, October 23rd, 2007
  • 4. Risk Is a person or situation that poses a possible threat to the security of something. The effect of uncertainty on objectives1. Vulnerability Is a weakness or gap in a security protections, control measures or processes that can be exploited by an adversary to remove, damage or destroy an asset. 1Risk Management Principles and Guidelines, AS NZS ISO 31000:2009
  • 5. Risk has three key characteristics1: It looks ahead into the future; There is an element of uncertainty e.g. a condition or a situation exists that might cause a problem for the project in the future; It is related to the outcome. 1Project Complexity and Risk Assessment Tool, Version 1.4,. Treasury Board of Canada Secretariat
  • 6.
  • 7. Risk = P x I Risk = P x I x V Risk = PA (1 – PI) C Risk = P x I x M Risk = Probability x Impact Security Controls Risk = P X E (Exploitability of Protection)
  • 9. © The Banks Group Inc. - 2016
  • 10.
  • 11. Risk is never static. Risk can be within or outside our sphere of control. Risk is affected by both the adversary and the target. A convertible asset requires multi-stage “risk continuum” consideration. What can be done to positively affect the “risk triangle”? Corporate “Risk Appetite”? Probability
  • 12. Quantifiable Risk Risk we can precisely measure and record with numbers: How many security controls are present? Is the control strength rated? How many attacks per day do we see? How many times did this happen in the past? How many vulnerabilities exist? etc. Qualifiable Risk Risk we have an idea about but can't accurately measure and is thus subjective: How confident are we with the code-base? Do we think the project has had sufficient review? Do we think this control is efficient? etc.
  • 13. Possibility – An event that could occur. Probability – The likelihood of the event occurring. A “possibility” is any event which has a “probability” of occurrence which is greater than “0”.
  • 14. A threat-event will take place? The threat-event will be mitigated to some degree? The adversary will be 100% successful? What probability? Impossible? Even Chance? Certain?
  • 15. Historical record Anecdotal info Police sources Industry sources Networking Credible intelligence Security technology inputs Industry experience …………………….?
  • 16. Probability of a six being on the upper surface of one dice…? Probability of two sixes being on the upper surface of two dice…? Probability of three sixes being on the upper surface of three dice…?
  • 17. A system with three components fails if one or more components fail. The probability that any given component will fail is 1/10. What is the probability that the system will fail?
  • 18. Business impact analysis S.W.O.T analysis Past experience Risk manager In-house counsel Public relations Employees Etc...
  • 20. • R = Risk to the facility of an adversary gaining access to assets (ranges from 0 to 1.0). • PA = Probability of an adversary attack during a period of time. • PE = Probability of Preventing the Event. • = P(I) INTERUPTION x P(N) NEUTRALIZATION • C = Consequence Value. Note: If PE is the probability of preventing the event then [1-PE] must be the probability of the adversary being successful R = PA * [1-(PE)] *C * The Design and Evaluation of Physical Security Systems, Garcia, Mary Lynn, Butterworth-Heinemann, 2001 Risk = Probability Vulnerability Impact
  • 21. Vulnerabilities are always present? Vulnerabilities are not static. Vulnerabilities become transparent if not treated. Vulnerabilities are measurable.
  • 22.
  • 24. What is vulnerable? Why is it vulnerable? What makes it vulnerable? Is the vulnerability easily exercised? Can the vulnerability be mitigated?
  • 25. Management and Measurement Identify vulnerabilities. Establish parameters. Identify options. Implement options. Measure outcome. Remediate as required. Monitor and report. Vulnerability Register.
  • 26. Vulnerability Vulnerability Type Threat Relationship Dependency ? Remediation WHAT IS IT? P, P or T Tailgating People Daily Operations Access Management Protocol Education and Awareness, Signage, Anti- Passback
  • 27. Pareto Analysis Pair-wise Comparison Fault Tree Analysis Attack Tree Analysis Failure Mode & Effect Analysis Failure Modes, Effects & Criticality Analysis C.A.R.V.E.R (modified) Cause & Effect (Ishikawa) Monte Carlo Simulation _____________________? Qualitative vs Quantitative
  • 28. Fit-for-Purpose: A protection/control measure which is formally selected and mitigates the known and reasonably foreseeable threats. State-of-Readiness: A protection/control measure which is implemented, operated, maintained and demonstrably capable of mitigating known or reasonably foreseeable threats.
  • 29. Rating Fit-for-Purposes Scoring Rationale 5 Protection selected based on recognized standard or leading practice. A formal performance level was identified and is still being met or exceeded. 3 Protection not specifically appropriate for the threat, operational or functional environment or it is only nominally achieving the required level of performance. 1 Protection is inappropriate for threat, operational or functional environment or is not meeting a required level of performance. Rating State-of-Readiness Scoring Rationale 5 Protection is functioning as designed and is operational in all respects. There is little or no down-time and there is no record of it being compromised. 3 Protection is primarily functioning as designed although there is occasional down-time due to loss- of-service or periodic break- down. 1 Protection is not functioning or not being in a State-of-Readiness due to periodic loss-of-service or break-down.
  • 30. Fit-for-Purpose and State-of-Readiness ratings are independent so the overall rating is the product of the two. A protection which is both fully Fit-for-Purpose and in a complete State-of-Readiness should achieve a score of 25. If the assessor believes Fit-for-Purpose = 5 but the State-of-Readiness = 3 then the overall rating of the protection is 15 or 60% effective and it has a vulnerability level of 40%.
  • 31. 1. Develop the protection design to meet DBT. 2. Identify appropriateelements of the design. 3. Identify how protection system will be evaluated for effectiveness over time.
  • 32. Characteristic Insider Criminal Organized Crime Objective Steal assets such as tools, parts. Steal large quantity of valuable assets. Steal large quantities of finished product. Motivation Personal gain, revenge. Personal gain. Large gain for criminal organization. Base Enhanced Base Enhanced Base Enhanced Planning/System Knowledge Good depending on position. Significant. Some, opportunistic. Significant if in collusion with insider. Good to high level. Extensive information and level of access. Weapons None Edged weapons Edged weapons Hand guns, shot guns Unlikely Wide array of weapons Tools and Equipment Access keys or credentials. Access keys, credentials & combinations. Hand tools or readily available tools at the facility. Hand and power tools. Hand tools or readily available tools at the facility. Access keys, credentials and combinations. Hand and power tools. Contaminants N/A N/A N/A N/A N/A N/A IMPACT (damage) to Asset(s) Minimal Notable Notable Significant Notable to Significant Significant to Critical Injury to Persons No Possible but unintentional Possible but unintentional Possible Possible but unintentional Possible and intentional Fatalities No No No Possible but unintentional Possible but unintentional Possible and intentional
  • 33.
  • 34. 1The Design and Evaluation of Physical Protection Systems, Mary Lynn Garcia, Sandia National Laboratories, Albuquerque, New Mexico, Butterworth- Heinemann, 2001
  • 35. Define the Context – Measuring What? Identify all contributing security element(s). Use known or reasonably foreseeable threat(s). Step through the process and assign scores – Does it make sense? Team approach/peer review.
  • 36. Protection Deter Deny Detect Delay Respond Protection Score % Cont. Comments Fence 3 3 0 3 0 9 11 Bldg Const. 5 5 0 5 0 15 19 AM & IDS 1 3 5 3 3 15 19 CCTV 3 1 5 0 5 14 18 Sec Guards 5 3 3 3 5 19 24 Employees 1 0 3 0 3 7 9 18 15 16 14 16 Actual Score = 79 Possible Score = 115 Overall Effectiveness = 69%
  • 37.
  • 38.
  • 39. PROBABILITY IMPACT VULNERABILITY 1. Collecting, recording and analyzing information and data to develop security intelligence. 2. Networking and contact development. 3. Modeling and threat forecasting 1. Business impact analysis. 2. Identification of critical structures, operations and people. 3. Implementation and maintenance of organizational resilience. 1. Criticality analysis. 2. Threat and threat event identification. 3. Vulnerability analysis e.g. Pareto, CARVER & Monte Carlo Simulation etc. 4. Vulnerability assessment and reduction.
  • 40. Practice risk management or become very good at crisis management. Your choice….. Risk Management Crisis Management?
  • 41. Phillip Banks PE, CPP The Banks Group Inc. #4 – 1310 Wilkinson Road Comox, British Columbia Canada V9M 0B3 604.762.5852 pbanks@thebanksgroup.ca www.thebanksgroup.ca © The Banks Group Inc. - 2017
  • 42. Protection of Assets Manual, ASIS International Industry Guidelines on a Framework for Risk Related Decision Support, UKOOA, 1999 GRiP – A flexible approach for calculating risk as- a function of consequence, vulnerability and Threat, R.G. Whitfield, W.A. Beuhring and G.W. Bassett, Argon National Laboratory, ANL/DIS -113, Decision and Information Services Division, January 2011. Maturity Framework for Assuring Resiliency Under Stress, Carnegie-Mellon University, Don O’Neill, 2008 Pareto-Optimal Situation Analysis for Selection of Security Measures, Andres Ojamaa, Enn Tyugu, Jyri Kivimaa, IEEE, 2008 Concept of Vulnerability in Chemical Plants, Journal of Chemical & Pharmaceutical Research, 6(7); 1448-1454, Dongfen Zhao, Su Hu, Cong An, Shuang Chen, Yifei Meng - 2004 Quantified Risk is a Weak Hypothesis, “A critical survey of results and assumptions”, Vilhelm Verendel, Chalmers University, 2009 General Security Risk Assessment Guideline, ASIS International Guidelines Committee, 2003 Indicators and criteria for measuring vulnerability: Theoretical Basis and Requirements, Jӧrn Birkmann, 2006 Defining and assessing quantifying security risk measures using vulnerability lifecycle and CVSS metrics, Hyun Chul Jon and Yashwant K. Malaiya, Colorado State University, Fort Collins, Colorado, USA, 2011 Risk Analysis and the Security Survey, Third Edition, James F. Broder, CPP, Butterworth-Heinemann, 2006 AS/NZS ISO 31000:2009 Standard, Risk Management Principles and Guidelines (Superseding AS/NZS4360:2004) AS/NZS HB 167:2006 Security Risk Management Standard Handbook The Design and Evaluation of Physical Protection Systems, Mary-Lynn Garcia, Sandia National Laboratories, 2001 Risk Assessment and Management for Critical Asset Protection (RAM-CAP), ASME Innovative Technologies Institute LLC, Washington, DC, 2004 Business Risk Assessment, David McNamee, The Institute of Internal Auditors, 1998 w3.epa.gov, Defining Risk Characterization http://www.algebra.com/algebra/homework/Probability-and-statistics/Probability-and-statistics.faq.question.419808.html