You are on page 1of 4

A Cause and Effect Approach Towards Risk Analysis

Laleh Pirzadeh Erland Jonsson


Department of Computer Science and Engineering Department of Computer Science as Engineering
Chalmers University of Technology Chalmers University of Technology
Göteborg, Sweden Göteborg, Sweden
laleh.pirzadeh@chalmers.se erland.jonsson@chalmers.se

Abstract— Risk analysis is critical for IT systems and for influence from the system operation, internal
organizations and their daily operation. There are various mechanisms and the impairments on system risk.
tools and methods to analyse risk. Most approaches take Indeed, other authors have suggested more refined risk
risk assessment as a result of specific factors (such as analysis methods, such as the probabilistic distribution
threats and vulnerabilities) without investigating the
impact of various types of system operation. Therefore, we
among successful attacks [23] or calculating the effect
suggest a causal approach toward risk analysis based on of aggregating different tasks in a complex business
an existing security model. We start out from a current process [24]. However, none of them has adopted the
risk analysis method and improve it by taking the system full input-output causal approach as the one presented
operation, causal relation between the impairments, as in this paper.
well as latency effects into account. The approach exhibits Thus, we suggest that risk analysis should incorporate
the impact of the attack chain of impairments on system the influence of the propagation of impairments, system
risk. We claim that the approach presented in this paper operation and latency on the system behaviour (output).
will make it possible to conduct a more refined This means that for a single attack (input) all possible
quantitative assessment of risk.
outcomes (outputs) are calculated with their respective
Keywords- security model; risk analysis; causal chain of
probability and delay, so as to add up to a composite
impairments; metrics; security planning; system operation risk assessment.
In the following, section II gives a brief summary of the
I. INTRODUCTION current research state in risk analysis. The security
Most IT organizations need to deal with different types model and its chain of impairments are described in
of daily decision making such as budget planning and section III. In section IV the implications of the model
security investment choices. Risk analysis is a critical to risk analysis is discussed. The paper is concluded in
task performed by CIOs and managers enhancing the section V.
decision making process. Although formal risk analysis II. CURRENT STATE IN RISK ANALSYSIS RESEARCH
is required by ANSI 2008 (for IT systems) and Basel II
(Financial regulations for Operational Risk), it is not There have been quite a number of approaches toward
necessarily part of the current security management of risk assessment and analysis. We will not try to cover
many IT organizations. all the existing approaches and tools but rather give a
Due to the criticality of a precise method for assessing brief review over some representative methodologies.
risk while making decisions, we suggest a novel In this paper we adopt the definition by Ralston et al.
approach toward risk analysis based on the causal chain [5] where risk assessment is defined as a multiphase
of impairments. See section III.B. This approach is process consisting of Risk Identification, Risk Analysis,
founded upon a previously proposed security model Risk Evaluation and Ranking, and Management and
[10], where security is quantified according to its Treatment phases. Risk assessment can be categorized
interaction with the environment. The model can be into two main categories i.e. qualitative and
applied to risk analysis so as to incorporate influence quantitative. One general issue that should be noted for
from internal system operations. both groups is the necessity of identifying resources to
There have been various proposals for risk calculations be protected (targets), the threats in the environment,
within organizations and industry. These methods vary and vulnerabilities existing within the systems. A novel
from qualitative to quantitative risk analysis. qualitative security risk assessment approach based on
Qualitative approaches are useful for more abstract vulnerability analysis has been proposed by Elahi et al.
levels of analysis and comparison. However, risk [20] which is applicable in early requirement
quantification methods such as Reduced Risk [5], [25] engineering phase. A list of existing risk assessment
and Risk based Return on Investments (RROI) [7] take tools is provided by the Riskworld website [22] among
us one step further and offer more refined information which OCTAVE [27], RISKWATCH [28] and CORAS
on system risk by identifying the gained benefit or [26] are common.
reduced risks. Quantitative risk analysis methods are subcategories of
Current approaches for risk analysis and quantification Probabilistic Risk Assessment methods (PRA) [5]
are in many cases based on a very simplistic assumption where the risk associated with complex technological
about the relation between risk event and risk impact. entities is analyzed by assuming to have the knowledge
What is missing in these methods is the probabilistic about different risks in the system. Different scenarios,
frequencies, and their consequences in terms of impact
are presented in PRA. In this approach, the risk metric 𝑅𝐼𝑆𝐾 = 𝑇ℎ𝑟𝑒𝑎𝑡 ∗ 𝑉𝑢𝑙𝑛𝑒𝑟𝑎𝑏𝑖𝑙𝑖𝑡𝑦 ∗ 𝐼𝑚𝑝𝑎𝑐t (3)
is a consequence-oriented figure of merit, e.g. the
probability of the top event [5]. However, determining Where:
the basic event probabilities is the most challenging • Threat denotes the expected number of attacks
phase in this approach. See [2], [4] for more details on of a particular type within a specified time unit
PRA. Some of the popular PRA methods are • Vulnerability is the extent to which the
Fault/Attack Tree Analysis [1-3], Event Tree Analysis organization or system is vulnerable to the
[2], Failure Mode and Effect Analysis [15], [16], threat and gets affected, and
Failure Mode Effect and Criticality Analysis [17], [18], • Impact is the costs of the harm as loss in terms
Cause/Consequence Analysis, Directed graphs and of monetary/reputation/market loss.
logical diagrams methods [4] and MORDA [21].
Another approach for risk assessment is the cost-benefit This approach is useful for calculating risk for different
risk assessment model proposed by Wyss et al. [8]. In IT systems in hostile environments.
this approach the decision makers are capable to The most common formula for calculating risk is
perform risk-based cost-benefit prioritization of various presented in equation (4).
security investments/mechanisms. Their risk metric is
based on the degree of difficulty for a successful attack 𝑅𝐼𝑆𝐾 = 𝐿𝑖𝑘𝑒𝑙𝑖ℎ𝑜𝑜𝑑 ∗ 𝐿𝑜𝑠𝑠 (4)
(effort-based approach).
One of the most commonly used quantitative risk This approach is the basis of our proposal in the paper.
models is RROI (Risk based Return On Investment) [7] The risk of a bad event exposure is calculated according
which calculates risk based on net bypass rate, incident to the loss (consequences) and its probability/likelihood
risk, baseline scenario, and net benefit as shown in of occurrence (frequency). We discuss more about this
equation (1). method in section IV.
𝐵𝑎𝑠𝑒𝑙𝑖𝑛𝑒 𝑆𝑐𝑒𝑛𝑎𝑟𝑖𝑜−𝑅𝑒𝑠𝑖𝑑𝑢𝑎𝑙 𝑟𝑖𝑠𝑘−𝐶𝑜𝑠𝑡
𝑅𝑅𝑂𝐼 = (1)
𝐶𝑜𝑠𝑡 III. SECURITY MODEL AND CHAIN OF IMPAIRMENTS

Return On Security Investment [6] is a similar approach In this section we explain the security model, which is
based on ROI and calculates risk as shown in equation the basis for our proposal on model based risk analysis.
(2). This approach incorporates risk exposure and Furthermore we discuss the causal chain of impairments
percentage of risk mitigated for different security and its role in risk analysis.
mechanisms when calculating ROSI therefore A. The security model
enhancing comparison between these mechanisms.
Previously we have introduced an integrated security
(𝑅𝑖𝑠𝑘 𝐸𝑥𝑝𝑜𝑠𝑢𝑟𝑒∗%𝑅𝑖𝑠𝑘 𝑀𝑖𝑡𝑖𝑔𝑟𝑎𝑡𝑒𝑑)−𝑆𝑜𝑙𝑢𝑡𝑖𝑜𝑛 𝐶𝑜𝑠𝑡 and dependability model based on the system’s
𝑅𝑂𝑆𝐼 = interaction with its environment [10]. The basic idea
𝑆𝑜𝑙𝑢𝑡𝑖𝑜𝑛 𝐶𝑜𝑠𝑡
(2) behind this model is to analyse system security in
relation to its environment, in terms of system input and
Influence and Decisions Diagrams [13], is a decision output thus enhancing the cause and effect concept.
driven approach toward risk analysis that calculates risk The model proposes three categories of security
based on utility functions and net benefits. attributes: protective, correctness, and behavioural. The
A model-based approach for quantitative enterprise protective attribute is integrity, which identifies a
security assessment (Quality of Protection) was system’s capability of preventing fault introduction.
provided by [23]. In this model the number of attacks The output from the system is considered as the system
from certain threats is measured and their relative behaviour. The behaviour must be different for
likelihood of propagation among the “dependencies” in authorized users and unauthorized users. Thus, the
the underlying enterprise model is estimated. This requirement on the system is that it must deliver its
approach is based on a “Security Meta Model” and information (or service) to authorized users. This is the
“Threat Graph”, which is relatively similar to the attack availability attribute. However, it must not deliver
tree concept. The Security Meta Model defines risk as information to unauthorized users, as reflected by the
“any threat that targets a specific model element and confidentiality requirement. Other behavioural
may result in the violation of a security requirement”. attributes are reliability and safety. See [10], [11] for
Quantified risk is another proposed method for the more details.
decision-making process in security [15]. This method
B. Chain of Impairments
is based on the probabilities and losses of events. Thus,
prospect theory, rationality, reframing and normative One of the advantages of our security model is its clear
frameworks have been discussed in detail. exhibition of the causal chain of impairments, from
U.S. Department of Homeland Security proposed the threat and attack to the system failure, see Figure 1.
following equation (3) to calculate risk based on This (cause and effect concept) is the basis of our
vulnerabilities, threats, and their impact [9].
proposed approach toward risk analysis. Here we give A. Rationale
an explanation of the causal chain of impairments. Risk is basically an interpretation of the event
An attack is launched by a threat from the system’s occurrence probability by assessing its effects on our
input environment. If successful in bypassing the system. The traditional and common definition of risk
boundary protection mechanisms (if any) there is an analysis covers the answers to the three fundamental
intrusion, which puts the system in an unwanted state. questions [8], [19]:
This system state is called an internal system error. 1. What can happen?
Depending on recovery mechanisms and system 2. What is the probability (likelihood) of it to
operations there are three possible outcomes of this happen?
situation. The first case is when some internal recovery 3. What are the consequences and impact (loss)
mechanism is able to remove the error. Thus, no failure if something happens?
(behavioural failure) will occur. A second case is when Based on these questions we formulate risk by the
the error becomes latent in the system until it following equation.
propagates to the output thus causing a failure after
some delay, which may be short or long. The latency 𝑅𝐼𝑆𝐾 = 𝐸𝑣𝑒𝑛𝑡 ∗ 𝐿𝑖𝑘𝑒𝑙𝑖ℎ𝑜𝑜𝑑 ∗ 𝐿𝑜𝑠𝑠 (5)
time varies based on the attacker intention, system
operation, and error characteristics. See [14]. Please Where:
note that a high latency, i.e. a long delay before the • Event denotes some kind of initiating
output is influenced, is equivalent to better system detrimental influence on the system, e.g. an
behaviour, e.g. higher reliability, and thus reduced risk. attack, possibly leading to a system failure,
In the limit, i.e. for an infinite latency, there will be no • Likelihood denotes the probability of the
risk at all. The final case happens when the system Event occurrence, and
failure occurs without noticeable delay, as a result of
• Loss/Impact indicates the resulting
negligible error latency.
consequences caused by the Event including
Thus, we see how an attack may cause an error that
monetary, resource or other loss
propagates to cause a failure. This highlights the
Although this approach is being applied to decision
relation between integrity on one side and behavioural
making processes by CIOs and managers, it has a major
attributes such as reliability, availability, safety and
shortage. The main issue is that it has an abstract
confidentiality on the other. The relation between the
perspective and does not take the cause and effect
attacks and the service is a complicated issue that calls
relations between input events and output effects into
for further investigation of internal system factors and
account.
the attack characteristics.
However, there are other causes for system failure other B. An improved method for risk analysis
than malicious attacks. Another such case is when a In this section we propose an improved approach for
failure occurs without any external threat or attack, e.g. risk analysis. This approach takes the system’s
due to the breakdown of a physical component. Figure 1 operation, the internal factors and the chain of
illustrates the main phases of the causal chain of impairments into account for risk analysis, which means
impairments of the attack process. that we can more accurately model risk analysis than
before. It is worthy to note that different types of Events
can lead to similar types of failures. This is the result of
the effect of varying impairment propagation and
dynamic system operations. On the other hand, and for
the same type of reasons, the same Event can cause
different types of failures, where each type of failure
comes with a specific probability. Thus, there is not a
one-to-one relation between an Event and the
corresponding Impact as described in equation (5).
Rather, the relation is a probabilistic one-to-many, in
the sense that each generating event can lead to several
failures and several corresponding losses, all of them
with a related probability. This can be reflected in the
following improved equation for risk assessment:
Figure 1. Chain of Impairments and Risk
RISK= Event * Likelihood *
IV. IMLICATIONS OF THE SECURITY MODEL FOR RISK
Ʃ (Probability of Propagation * Loss) (6)
ANALYSIS
In this section we show how the security model could Here:
be used for making a refined and more detailed risk • Event denotes some kind of initiating
analysis that would also incorporate influence from the detrimental influence on the system, e.g. an
system’s internal operation. attack, possibly leading to a system failure,
• Likelihood (Probability of Occurrence) is the [7] Arora, A.; Hall, D.; Piato, C.A.; Ramsey, D.; Telang, R.;
“Measuring the risk-based value of IT security solutions”, IT
probability that the Event occurs, Professional , vol.6, no.6, pp. 35- 42, Nov.-Dec. 2004
• Probability of Propagation is the probability [8] Wyss, G.D.; Clem, J.F.; Darby, J.L.; Dunphy-Guzman, K.;
that an Event leads to a specific failure. This Hinton, J.P.; Mitchiner, K.W.; “Risk-based cost-benefit analysis
failure is one of the possible failures that may for security assessment problems”, Security Technology
(ICCST), 2010 IEEE International Carnahan Conference on ,
result from a specific Event, vol., no., pp.286-295, 5-8 Oct. 2010
• Loss is the loss (e.g. in EUR) associated with [9] U.S. Department of Homeland Security Risk Steering
each failure that the Event can lead to, and Committee, “Risk Lexicon,” U.S. Department of Homeland
• Sum is taken over all possible failures related Security, Washington, DC., September 2008.
to one specific Event with their related losses. [10] E.Jonsson, “Towards an integrated conceptual model of security
and dependability”, Availability, Reliability and Security, 2006.
ARES 2006. The First International Conference on , vol., no.,
Thus, equation (6) permits considering influence from pp. 8 pp., 20-22 April 2006.
system-internal factors on the risk assessment, [11] E.Jonsson, L.Pirzadeh, “A Framework for Security Metrics
something that is not possible when using equation (5). Based on Operational System Attributes”, Technical report,
This is addressed by taking the sum over all different Chalmers University of Technology, 2011
propagations of system internal operation initiated by [12] V.Verendel, “The Security Gap: Bias for Quantified Risk”,
Technical report, Chalmers University of Technology, 2010
the same Event. As mentioned in section III.B the same
[13] Kevin J. Soo Hoo, “ How Much Is Enough?A Risk-
Event might lead to various failures. For instance in a Management Approach to Computer Security”, working paper,
PC depending on an antivirus program, the same threat Consortium for Research on Information Security and Policy
can lead to different system failures depending on the (CRISP) June 2000
various outcomes of the program and these will all be [14] E. N. Adams, “Optimizing preventive service of software
taken into account in the risk calculation. products”, IBM Journal of Research and Development, vol. 28,
No. 1, pp. 2-14, 1984.
V. CONCLUSION [15] Dependability - Analysis techniques for system reliability -
Procedure for failure mode and effectsanalysis (FMEA), SS-IEC
We have proposed an improved approach to risk 812,2 pages, 1988
analysis and quantification. The approach is based on [16] Process Failure Mode and Effects Analysis (FMEA), JEP131,
an earlier suggested security model and its causal chain 19 pages, 1998
of impairments. The model describes system security [17] Bowles, J.B.; , “The new SAE FMECA standard,” Reliability
and Maintainability Symposium, 1998. Proceedings., Annual ,
based on its interaction with the environment. vol., no., pp.48-53, 19-22 Jan 1998
Accordingly the proposed risk analysis method provides [18] “The FMECA Process in the Concurrent Engineering (CE)
a clear exhibition of the system operation and attack Environment”, Society of Automotive Engineers Aerospace
impact on system behaviour and in particular system Information Report AIR4845, Approx. 10 co-authors, June
failure. Therefore, this approach is more fine-grained 1993.
than many other risk analysis methods. However, the [19] S. Kaplan, and B.J. Garrick, “On the Quantitative Definition of
Risk,” Risk Analysis, vol. 1, No.1, pp.11-27, 1981
probabilistic relations among different system’s internal
[20] G. Elahi, E. Yu, N. Zannone, “Vulnerability-centric
operations/mechanisms and their influence on the requirements engineering framework: analyzing security attacks,
system failure call for further investigation. As a countermeasures, and requirements based on vulnerabilities,”
conclusion, this approach improves risk analysis by Requirements Engineering, Special Issue on RE09, vol. 15,
No.1, March 2010
considering more details about system operation.
[21] Buckshaw, D. L., Parnell, G.S., Unkenholz, W.L., Parks, D.L.,
REFERENCE Wallner, J.M., & Saydjari, O.S, “Mission Oriented Risk and
Design Analysis of Critical Information Systems,” Military
[1] Schneier, “Attack Trees,” Dr. Dobb’s Journal, December 1999, Operations Research, vol. 10, No. 2, pp. 19-38, 2005.
http://www.schneier.com/paper-attacktrees-ddj-ft.html, accessed [22] Riskworld website available at:
March 2006.
http://www.riskworld.com/SOFTWARE/SW5SW001.HTM
[2] W. Vesely, M. Stamatelalos, J. Dugan, J. Fragola, J. Minarick,
“Fault Tree Handbook with Aerospace Applications,” Report by [23] R. Breu, F. InnerhoferOberperfler, A.Yautsiukhin, “Quantitative
NASA Office of Safety and Mission Assurance, August 2002, assessment of enterprise security system,” ARES’08
http://www.hq.nasa.gov/office/codeq/doctree/fthb.pdf, accessed Proceedings of the 2008 Third International Conference on
April 2006. Availability, Reliability and Security, pp.921-928, 2008
[3] W. Vesely, “Fault Tree Analysis (FTA): Concepts and [24] F.Massacci, A. Yautsiukhin, “Modelling Quality of Protection
Applications,” NASA document, in Outsourced Business Processes”, In Proc. of IAS'07, IEEE
http://www.hq.nasa.gov/office/codeq/risk/ftacourse.pdf, Press 2007
accessed April 2006. [25] G. D. Tolbert, “Residual Risk Reduction,” Professional Safety,
[4] E. Henley, H. Kumamoto, “Probabilistic Risk Assessment”, 2nd pp. 25-33, November 2005
edition, IEEE Press, New York, 1996. [26] CORAS website available at: http://coras.sourceforge.net/
[5] Dr. Patricia A. Ralston, Dr. James H. Graham and Dr. Sandip C. [27] P. Marek, J. Paulina, “The OCTAVE methodology as a risk
Patel., “Literature Review of Security and Risk Assessment of analysis tool for businessresources”, In Proc. Of the
SCADA and DCS systems”, Technical Report TR-ISRL-06-01, International Multiconference on Computer Science and
2006 Information Technology, pp. 485-497, 2006
[6] W. Sonnenreich, J. Albanese, and B. Stout, “Return On Security [28] RISKWATCH website available at: http://www.riskwatch.com/
Investment (ROSI): A Practical Quantitative Model”, in Proc.
WOSIS, 2005, pp.239-252.

You might also like