Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title page
Table of Contents
Copyright
Acknowledgments by Jack Jones
About the Authors
Preface by Jack Jones
Preface by Jack Freund
Chapter 1. Introduction
How much risk?
The bald tire
Assumptions
Terminology
The bald tire metaphor
Risk analysis vs risk assessment
Evaluating risk analysis methods
Risk analysis limitations
Warning—learning how to think about risk just may change your professional life
Using this book
Chapter 2. Basic Risk Concepts
Possibility versus probability
Prediction
Subjectivity versus objectivity
Precision versus accuracy
Chapter 3. The FAIR Risk Ontology
Decomposing risk
Loss event frequency
Threat event frequency
Contact frequency
Probability of action
Vulnerability
Threat capability
Difficulty
Loss magnitude
Primary loss magnitude
Secondary risk
Secondary loss event frequency
Secondary loss magnitude
Ontological flexibility
Chapter 4. FAIR Terminology
Risk terminology
Threat
Threat community
Threat profiling
Vulnerability event
Primary and secondary stakeholders
Loss flow
Forms of loss
Chapter 5. Measurement
Measurement as reduction in uncertainty
Measurement as expressions of uncertainty
But we don’t have enough data…and neither does anyone else
Calibration
Equivalent bet test
Chapter 6. Analysis Process
The tools necessary to apply the FAIR risk model
How to apply the FAIR risk model
Process flow
Scenario building
The analysis scope
Expert estimation and PERT
Monte Carlo engine
Levels of abstraction
Chapter 7. Interpreting Results
What do these numbers mean? (How to interpret FAIR results)
Understanding the results table
Vulnerability
Percentiles
Understanding the histogram
Understanding the scatter plot
Qualitative scales
Heatmaps
Splitting heatmaps
Splitting by organization
Splitting by loss type
Special risk conditions
Unstable conditions
Fragile conditions
Troubleshooting results
Chapter 8. Risk Analysis Examples
Overview
Inappropriate access privileges
Privileged insider/snooping/confidentiality
Privileged insider/malicious/confidentiality
Cyber criminal/malicious/confidentiality
Unencrypted internal network traffic
Privileged insider/confidentiality
Nonprivileged insider/malicious
Cyber criminal/malicious
Website denial of service
Analysis
Basic attacker/availability
Chapter 9. Thinking about Risk Scenarios Using FAIR
The boyfriend
Security vulnerabilities
Web application risk
Contractors
Production data in test environments
Password security
Basic Risk Analysis
Project prioritization
Smart compliance
Going into business
Chapter summary
Chapter 10. Common Mistakes
Mistake categories
Checking results
Scoping
Data
Variable confusion
Mistaking TEF for LEF
Mistaking response loss for productivity loss
Confusing secondary loss with primary loss
Confusing reputation damage with Competitive Advantage loss
Vulnerability analysis
Chapter 11. Controls
Overview
High-level control categories
Asset-level controls
Variance controls
Decision-making controls
Control wrap up
Chapter 12. Risk Management
Common questions
What we mean by “risk management”
Decisions, decisions
Solution selection
A systems view of risk management
Chapter 13. Information Security Metrics
Current state of affairs
Metric value proposition
Beginning with the end in mind
Missed opportunities
Chapter 14. Implementing Risk Management
Overview
A FAIR-based risk management maturity model
Governance, risks, and compliance
Risk frameworks
Root cause analysis
Third-party risk
Ethics
In closing
Index
← Prev
Back
Next →
← Prev
Back
Next →