Security Basics mailing list archives

RE: Getting the value of an asset and the probability of a risk to it


From: Craig Wright <Craig.Wright () bdo com au>
Date: Sun, 18 May 2008 10:48:43 +1000


So the real question Jon.

How do you do any qualitative risk modelling that is not a measure of perception or laughable?

Regards,
Craig


Craig Wright
Manager, Risk Advisory Services

Direct : +61 2 9286 5497
Craig.Wright () bdo com au
+61 417 683 914

BDO Kendalls (NSW-VIC) Pty. Ltd.
Level 19, 2 Market Street Sydney NSW 2000
GPO BOX 2551 Sydney NSW 2001
Fax +61 2 9993 9497
http://www.bdo.com.au/

The information in this email and any attachments is confidential. If you are not the named addressee you must not 
read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received 
this message in error, please notify the sender by return email, destroy all copies and delete it from your system.

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. 
You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer 
viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy 
statement, can be found on the BDO Kendalls website at http://www.bdo.com.au/ or by emailing mailto:administrator () 
bdo com au.

BDO Kendalls is a national association of separate partnerships and entities. Liability limited by a scheme approved 
under Professional Standards Legislation.
-----Original Message-----

From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Jon Kibler
Sent: Saturday, 17 May 2008 12:01 PM
To: Sergio Castro; security-basics () securityfocus com; Rivestp () metro ca
Subject: Re: Getting the value of an asset and the probability of a risk to it

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sergio Castro wrote:
Hi Philippe,

The only true way of doing a quantitative risk assessment on an asset is using statistics.
<SNIP!>

In theory, yes.

In reality, it just doesn't work that way.

For example: Historically, the chances of a Windows box on a secure
network getting rooted were less than 1 in 100,000. But if you use that
as a basis for computing future risk, I would argue that the historical
data has absolutely zero to do with reality today or in the future.

I would suspect that within the next 12 to 24 months, the chances of a
Windows box on a secure network getting rooted are about 1 in 1,000. So,
if you use statistics based on historical data, your risk assessment is
off by two orders of magnitude! (These numbers are for illustrative
purposes only! I just created these numbers by AE, but they are probably
within an order of magnitude of being correct.)

So, when projecting risk for the next 5 years, from where do you get the
data to form your statistical basis for risk?

Another example: A couple of years ago I heard Gadi Evron talk about
hardware rootkits (in BIOS, Video NRAM, NICs, Routers, etc.). Most
people laughed at the idea. And now, what is the big anticipated talk at
EusecWest? IOS Rootkits.

Again, how do you base risk on historical data, or do any type of risk
modeling when historical data is not applicable today and no one has a
reasonable guess for the future? To use statistics, it has to be based
on data. When historical data is not representative of current / future
risk, it is not a valid basis for forming statistical projections -- of
risk, or anything else for that matter.

As I said previously, it is essentially impossible in today's I.T.
security environment to do quantitative risk assessment that stands any
chance of passing the laugh test.

Except perhaps for risks associated with Mother Nature. And with climate
change, who knows how accurate those data will be?

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkguPEgACgkQUVxQRc85QlPoMwCfdNcxLlGPl9s5PtJImaEuNHXl
FPEAoKCKXtcpYCFdXUM5Z4MSchxGR1Wm
=p9hK
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.



Current thread: