• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 3

August 17, 2021 by David Lanter 4 Comments

What challenges are involved in performing a quantitative information security risk analysis?

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    August 24, 2021 at 9:13 pm

    There are a few challenges that come to mind when performing a quantitative information security analysis. Generally, the quantitative approach is expressed in monetary terms which is unnecessary or and arguably, not possible when determining the value of intangible assets. Quantitative risk evaluation may also be impractical when there is insufficient data on hand to be analyzed because it will not lead to a successful risk management strategy. Although quantitative risk assessments are considered to be more subjective, the given perceived risk numerical values are more simplistic in nature; therefore, easier to work with and understand at all administrative levels. Vacca Chapter 1 emphasizes the importance of awareness and ownership at all administrative levels. It is possible that the quantitative information security risk approach overlooks security awareness training for employees that lack IT knowledge and fails to clearly communicate the risk narrative to personnel. Lastly, this type of assessment happens to be the most expensive and time-consuming method which may not be in reach for startups or small enterprises. Not to mention, it would require considerable efforts to build and maintain.

    Log in to Reply
  2. Alexander William Knoll says

    August 25, 2021 at 10:49 pm

    When performing a performing a quantitative information security risk analysis, there are a couple challenges that may arise. The first is a lack of support from management. They may view the risk as negligible, but not really know the extent of the risk because they are more concerned with financials than anything else. Another issue is that quantitative risk uses numerical values to quantify the risk, which could make make the risk very difficult to approach.

    Log in to Reply
  3. Yangyuan Lin says

    August 26, 2021 at 12:22 am

    Performing quantitative information security risk analysis requires a lot of time, money, or human resources. Generally, companies think that good hardware or software can be resisted. It is a fact that they ignore the most basic security mechanisms. Although a third-party review will allow internal employees to let go of their paranoia, it may lead to worth threats if a conflict of interest arises from a third-party review (for example, Enron). One of the important items is information security risk training for employees, such as setting security passwords.

    Log in to Reply
  4. Shubham Patil says

    August 26, 2021 at 4:33 pm

    For a smooth and safe business processes, it’s very important to find all the potential factors that might prevent it. Quantitative risk assessment brings numbers into the equation, with analysis based on the likelihood that particular threats will manifest, and pre-determined measurement scales used to establish the risks or losses associated with those threats. It most thorough method of performing a risk analysis. This also makes it the most expensive and time-consuming method – and therefore not the ideal first choice for cash-strapped or smaller scale enterprises. Organizations requiring legal protection against suits or disclosures, needing to satisfy stringent requirements for regulatory compliance, or having to reconcile budgets with risk analysis findings are most likely to opt for this approach.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in