Prospect Theory
Prospect Theory
Posted Sep 26, 2014 23:41 UTC (Fri) by dlang (guest, #313)In reply to: Prospect Theory by raven667
Parent article: Schneier on incident response
If you try to evaluate everything on a scale of 1-5, you end up with a lot of low-risk items being considered equivalent.
It's a good idea in theory, but in practice it doesn't help much.
Posted Sep 27, 2014 2:04 UTC (Sat)
by raven667 (subscriber, #5198)
[Link] (5 responses)
Posted Sep 27, 2014 2:17 UTC (Sat)
by dlang (guest, #313)
[Link] (4 responses)
I'm just saying that evaluating the risk on a scale of 1-5 really doesn't help much. There are too many possible problems and the probability that they will be exploited and the result of that exploit are not known well enough to reduce it to a simple number.
You can reduce it to a number, but in doing so, the person producing the number is really the one making the decision. If they decide that it was a high risk the "decision maker" will approve it, if they decide it's a low risk the "decision maker" will not approve it.
So this approach is great for justifying things, but poor for actually deciding things.
Posted Sep 27, 2014 2:55 UTC (Sat)
by raven667 (subscriber, #5198)
[Link] (3 responses)
This isn't about correctly guessing that next week someone is going to find a critical bug in bash that turns your world upside down, even with HIPPA you aren't held to that kind of standard, reasonable and prudent measures, which are highly subjective, are the standard, this is about constraining your problem space in a general way so that you aren't spasticly trying to fix all the possible problems, wasting weeks and months of effort on minutia that doesn't matter, driving yourself insane with stress while doing it.
Even after all your effort, someone might still break into your stuff, that's just the risk you take being on the Internet.
Posted Sep 27, 2014 4:35 UTC (Sat)
by dlang (guest, #313)
[Link] (2 responses)
The Impact of the risk can always end up being "your systems or 0wned" (see the recent example of a 1 byte overflow that Google programmers used to get total control of a system)
so everything boils down to guessing right on the likelihood of the risk to generate the resulting risk.
Or, if you are trying to guess the impact of an unknown exploit, you now have two randomly picked numbers that you are multiplying together to evaluate the risk.
It's not that hard to look at several items and rank them in what you think is the order of likelihood and impact, where you fail is when you try to quantify that issue A is 4x as likely as issue B
Posted Sep 27, 2014 17:44 UTC (Sat)
by raven667 (subscriber, #5198)
[Link] (1 responses)
Having your systems get owned is part of the impact but it isn't the whole impact in itself, what's more important is what happens if a particular system gets owned, does the application have access to personally identifiable information, what's the cost if that gets exposed. There is a difference between spending time to do incident response, wipe and reinstall (low impact) and business-ending legal action (severe impact).
These values may be subjective but they aren't random, you set up guidelines on how you score based on what is important to your organization. The scores can also help focus effort and let you know what good enough is so you can stop trying to be perfect and move on to the next need.
Posted Oct 5, 2014 18:55 UTC (Sun)
by Wol (subscriber, #4433)
[Link]
After all, doesn't it stand to reason :-) that reducing the *impact* of a breach is a far better (and more easily quantifiable) use of scarce resources than trying to reduce the risk of a breach.
Cheers,
Prospect Theory
Prospect Theory
Prospect Theory
Prospect Theory
Prospect Theory
Prospect Theory
Wol