Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 7, Problem 6E
Program Plan Intro

Single loss expectancy:

  • The expected monetary loss every time a risk occurs is called the Single Loss Expectancy.
  • The Single Loss Expectancy (SLE), Exposure Factor (EF) and Asset Value (AV) are related by the formula:
    • SLE = EF * AV
  • Introducing this conceptual breakdown of Single Loss Expectancy into Exposure Factor and Asset Value allows us to adjust the two terms independently and is related to risk management and risk assessment.
  • Asset Value may vary with market changes, inflation while Exposure Factor can be reduced by enabling preventive measures.

Annualized loss expectancy:

  • The product of the single loss expectancy (SLE) and the annual rate of occurrence (ARO) give annualized loss expectancy (ALE).
  • It is mathematically expressed as:
    • ALE = SLE * ARO
  • The important feature of Annualized Loss Expectancy is that it can be used directly in a cost- benefit analysis.

Blurred answer
Students have asked these similar questions
Give a brief description of each of the five risk-control strategies.
Write at least 4 examples of how you arrive at the risk rating for a given threat by asking questions to quantify the DREAD categories?
In this section, you will prepare a risk mitigation plan using SimpleRisk. Before using SimpleRisk, you will create a paper-based plan. You will need to create three security controls in your risk mitigation plan: one control that reduces the asset value, one that reduces the vulnerability severity, and one that reduces the threat impact. Your security controls should also include examples of both strategic and tactical controls. You can refer to the following table for a clearer picture of the requirements. Security Control Reduces Level (strategic/tactical)   Asset value       Vulnerability severity       Threat Impact     Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files.   Once you have identified your security controls, use SimpleRisk to create a Risk Mitigation plan. You do not need to perform a management review in this section.
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning