Strategic Cyber Cost- Effectiveness Analysis Robin Smith Brief - - PowerPoint PPT Presentation

strategic cyber cost effectiveness analysis
SMART_READER_LITE
LIVE PREVIEW

Strategic Cyber Cost- Effectiveness Analysis Robin Smith Brief - - PowerPoint PPT Presentation

Strategic Cyber Cost- Effectiveness Analysis Robin Smith Brief Introduction Arke Cost analysis, cost effectiveness and cost benefit Aim to present our thinking Cost-Effectiveness/Cost-Benefit analysis of Cyber security


slide-1
SLIDE 1

Strategic Cyber Cost- Effectiveness Analysis

Robin Smith

slide-2
SLIDE 2

Brief Introduction

  • Arke  Cost analysis, cost effectiveness and cost benefit
  • Aim to present our thinking…
  • Cost-Effectiveness/Cost-Benefit analysis of Cyber security…
  • Different to the norm?
  • Interesting challenges?
  • How to address challenges?

Defining Problem Approach Process Benefits

  • f Process

Future? To keep track:

slide-3
SLIDE 3

Usual Spending Decisions

Budget Mitigations Risks Assets

Defining Problem Approach Process Benefits

  • f Process

Future?

(Spend on…) (Reduce the chance of…) (Something bad happening to…)

Key aspects for usual cases…

  • Cost-Effectiveness directly related  value for money for taxpayer
  • Through defence perspective
  • Assets  Entirely defence
  • Assets  Not necessarily interconnections/interdependencies
slide-4
SLIDE 4

Assets and Infrastructure: Strategic Level

Command & Control Operational Defence Infrastructure Critical National Infrastructure

Base

Destroyer

Command HQ

MOD

Major Industry Company

National Electricity Grid

FRONTLINE

  • Representation:
  • Network of nodes
  • Nodes layered from the

fighting end to the infrastructure that it depends upon in the long term

  • Usually, risk of ‘attacks’

considered at the operational end. Defining Problem Approach Process Benefits

  • f Process

Future?

slide-5
SLIDE 5

Assets and Infrastructure at Risk

Command & Control Operational Defence Infrastructure Critical National Infrastructure

Base Destroyer

Command HQ

MOD Major Industry Company National Electricity Grid

FRONTLINE

  • Representation:
  • Network of nodes
  • Nodes layered from the

fighting end to the infrastructure that it depends upon

  • Communication with each
  • ther and some might

depend on others to function

  • Usually, risk of attacks

considered at the

  • perational end.
  • All exposed to cyber

security risks Defining Problem Approach Process Benefits

  • f Process

Future?

slide-6
SLIDE 6

Cyber Security

Budget Mitigations Risks Assets

(Spend on…) (Reduce the chance of…) (Something bad happening…)

FRONTLINE

Key aspects for cyber security…

  • Cost-Effectiveness directly related  value for money for taxpayer
  • Through defence, trade, energy.. Etc.
  • Assets  Not all entirely Defence
  • Assets  Have interconnections/interdependencies

Defining Problem Approach Process Benefits

  • f Process

Future?

slide-7
SLIDE 7

Cyber Security

Defining Problem Approach Process Benefits

  • f Process

Future?

FRONTLINE

New problems with cyber security

  • 1. Wider Impacts (than just defence)
  • 2. Risks propagate (between nodes)
slide-8
SLIDE 8

Approach – Framework/Process

Defining Problem Approach Process Benefits

  • f Process

Future?

High-level understanding  Best way to spend money?

  • On reducing chance of successful cyber attacks

Budget Mitigations Risks Assets

(Spend on…) (Reduce the chance of…) (Something bad happening to…)

slide-9
SLIDE 9

Approach

Influencing our approach

  • Reflect principles of assessing risks to information systems in the UK
  • “HMG Information Assurance Standard 1 – Technical Risk Assessment”

(Government Standard) for information system risk assessment

  • Assess core goals of Information Assurance separately
  • Confidentiality
  • > Loss of privacy
  • Integrity
  • > Loss of trust
  • Availability
  • > Loss of presence
  • Assess relevant impact categories separately (‘Business Impact Levels’) e.g.
  • Military Operations
  • Trade
  • Energy… etc.

Challenges

  • Wider Impacts (than just military)

Defining Problem Approach Process Benefits

  • f Process

Future?

slide-10
SLIDE 10

Assessing Cost-Effectiveness

  • Quantifying Risks
  • CHANCE of a successful attack
  • IMPACT of a successful attack
  • Effectiveness of mitigations
  • Highest reduction in probability of successful attack
  • (want to reduce risks where they have a high impact)
  • Cost
  • Estimated costs of implementing mitigations
  • Estimated costs of risks affecting nodes

Defining Problem Approach Process Benefits

  • f Process

Future? 1 2 3

1 2 3

a b a b

slide-11
SLIDE 11
  • Probability of successful attack – based on…
  • different parameters for different risks
  • Example Risks could be quite different
  • Parameters may have different values for each node in the network

Quantifying Risks

1. Compromised Hardware

  • >

2. IP Theft

  • >

3. DOS attack – national scale

  • >

Indicative Parameters

quantities procured, percentage compromised SME judged /work-shopped quantities? # of people security cleared, percentage threats

Defining Problem Approach Process Benefits

  • f Process

Future? 1 CHANCE of a successful attack

1 2 3

a

slide-12
SLIDE 12
  • Uncertainty – MUST capture the ‘error margins’
  • Three point estimating
  • E.g. ‘Best Case’, ‘Most Likely’, ‘Worst Case’  Weighted mean value
  • Manually set distributions – eliciting uncertainty
  • Range of inputs
  • Background work  through to  best judgement
  • Identify and engage relevant Subject Matter Experts

Defining Problem Approach Process Benefits

  • f Process

Future?

Quantifying Risks

1 CHANCE of a successful attack

1 2 3

a

slide-13
SLIDE 13
  • For Risk x
  • Mean probability of occurrence

at each node

  • Usually
  • (unmitigated) probabilities of
  • ccurrence
  • ‘at risk’ assets not connected
  • Cyber
  • consider propagation of risks
  • ‘at risk’ assets are connected

Nodes: Risk 1

5x10-4 2x10-3 1x10-5 1x10-3 3x10-3 1x10-2

Defining Problem Approach Process Benefits

  • f Process

Future? CHANCE of a successful attack

Quantifying Risks

1

Risk Propagation - problem

1 2 3

a

slide-14
SLIDE 14

Quantifying Risks

  • Two connection types?
  • Conditional probabilities
  • Per risk per connection?
  • Two-way value, or one-way

values?

  • Implications
  • Simulation/modelling of

probability

  • Triggers an impact at the

node Nodes: Risk 1 High Security Low Security

5x10-4 2x10-3 1x10-5 1x10-3 3x10-3 1x10-2 5x10-4 2x10-3 1x10-5 1x10-3 3x10-3 1x10-2

0.2 0.2 0.4 0.3 0.2 0.1 0.1 0.1 0.1 0.1 0.1

1 CHANCE of a successful attack

Risk Propagation - treatment

Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

a

slide-15
SLIDE 15
  • Summary –
  • Detailed/not detailed info on risks
  • Capture uncertainty
  • Probabilities of Propagation
  • Use Subject Matter Expert judgement (where needed)

Quantifying Risks

1 CHANCE of a successful attack CHANCE of a successful attack Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

a

slide-16
SLIDE 16

Quantifying Risks

Impact

  • How bad is the loss of an asset?
  • 1. Categories e.g. …
  • Military Operations
  • Trade
  • Energy
  • 2. Time scale
  • 3. Confidentiality, Integrity or Availability

(loss of privacy, loss of trust, loss of presence) Impacts C/I/A # Time scales? IMPACT of a successful attack 1 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Categories b

slide-17
SLIDE 17
  • What is the impact of a successful attack?
  • Score 06 (e.g. consistent with ‘Business Impact Levels’)

Quantifying Risks

IMPACT of a successful attack 1 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Availability

Selection 1 Short Term

Selection 2

Military Ops

For Category:

4 5 5 3 2

Destroyer Base ComHQ MOD Major Contractor NatGrid

b

slide-18
SLIDE 18

Quantifying Risks

IMPACT of a successful attack 1 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Availability

Selection 1 Long Term

Selection 2

Military Ops

For Category:

6 2 2 5 5 5

Destroyer Base ComHQ MOD Major Contractor NatGrid

  • What is the impact of a successful attack?
  • Score 06 (e.g. consistent with ‘Business Impact Levels’)

b

slide-19
SLIDE 19

Quantifying Risks

IMPACT of a successful attack 1 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Confidentiality

Selection 1 Short Term

Selection 2

Military Ops

For Category:

3 4 5 2 2

Destroyer Base ComHQ MOD Major Contractor NatGrid

  • What is the impact of a successful attack?
  • Score 06 (e.g. consistent with ‘Business Impact Levels’)

b

slide-20
SLIDE 20

Quantifying Risks

IMPACT of a successful attack 1 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Confidentiality

Selection 1 Long Term

Selection 2

Military Ops

For Category:

6 2 3 5 3

Destroyer Base ComHQ MOD Major Contractor NatGrid

  • What is the impact of a successful attack?
  • Score 06 (e.g. consistent with ‘Business Impact Levels’)

b

slide-21
SLIDE 21
  • Summary –
  • Minimum information to capture wider impacts:
  • Categories
  • Time Scales
  • Confidentiality, Integrity, Availability

Defining Problem Approach Process Benefits

  • f Process

Future?

Quantifying Risks

1

1 2 3

IMPACT of a successful attack IMPACT of a successful attack b

slide-22
SLIDE 22
  • Similar to assessing CHANCE of a successful attack…

Effectiveness of Mitigations

2 Defining Problem Approach Process Benefits

  • f Process

Future? 2

  • Effectiveness of mitigations
  • How much does CHANCE of a successful attack decrease?
  • (how high an impact might there be if attack is successful)

1 2 3

  • Summary –
  • Detailed/not detailed info on mitigations
  • Capture uncertainty
  • Probabilities of Propagation
  • Use Subject Matter Expert judgement (where needed)
slide-23
SLIDE 23

Costs

  • Costs
  • Estimated costs of implementing mitigations
  • Estimated cost impact of risks affecting nodes
  • Q. How complex might the estimating be?

3 3 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

a b

slide-24
SLIDE 24

Costs

Mitigations

e.g.

  • 1. Reduce chance of an Edward Snowden?
  • Interview all personnel with security clearance X, every 5 years
  • 2. Reduce chance of buying compromised hardware?
  • Set up and run an organisation to scrutinise imports

Estimate cost of implementing

  • Not too difficult
  • Based on people and effort?

3 Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

a

slide-25
SLIDE 25

Costs – cost ‘impact’ at nodes

  • Cost ‘impacts’ of a successful attack
  • What is the cost of losing an asset (for each ‘C/I/A’ property)

CIA Data Sources Issues Military Non-Military Availability (loss of presence)

Country Force Structure Cost Model, military accounts (e.g. UINs) Overheads from company accounts Time-related Short and Long term costs of running the asset (inc. existing response information system staff etc.)

Confidentiality (loss of privacy)

Loss of profit, re-development costs

  • f exposed research, very uncertain

Integrity (loss of confidence)

E.g. Battlefield pictures

  • untrustworthy. Difficult to define,

proportion of availability/confidentiality?

! ! ! !

Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

b

slide-26
SLIDE 26

Benefits of Process

  • Summary of Process
  • Describe Assets (at high level) – network of nodes
  • Quantify Risks
  • Quantify Mitigation Actions
  • Quantify Costs
  • Feed information into a tool  assess most cost-effective combinations of

mitigations

Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

Cost- Effective? Affordable? Etc…

  • Same outputs for cyber security, by the approach discussed?
slide-27
SLIDE 27

Benefits of Process

  • Benefits
  • Audit trail for the evidence
  • Quickly assess alternative combinations of mitigations
  • Engage stakeholders – buy-in?
  • A Tool allows: Evolving Threat, Learning Curves in Mitigation
  • Assess at different levels of detail
  • Run strategic-level ‘attack’ scenarios

Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3

  • Applicable to cyber security, by the approach discussed?
slide-28
SLIDE 28

Future Effort

  • Future Effort
  • Risk Propagation

̶ Test methods of simulation

  • Cost Impacts

̶ Estimating ‘loss of trust’, ‘loss of privacy’

  • Example framework
  • Example tool
  • Scalability?
  • Easy/fast to add risks?
  • Easy/fast to add nodes (to the network of assets)?

Defining Problem Approach Process Benefits

  • f Process

Future?

1 2 3