• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2023 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 3

August 11, 2023 by David Lanter 11 Comments

What challenges are involved in performing a quantitative information security risk analysis?

Filed Under: Unit 01: Understanding an Organization's Risk Environment Tagged With:

Reader Interactions

Comments

  1. Jon Stillwagon says

    August 29, 2023 at 1:18 pm

    Keeping things transparent with the technology and the people doing the security risk analysis. Not being to transparent with the analysis because you still want to keep how they could get the information. How to combat each risk so that way there is a plan in place to keep from getting information stolen. coming up with a magnitude scale of each risk so the company can know what kind of state they are in when and what information gets leaked. Having backup plans for your plans on how to solve the issue at hand.

    Log in to Reply
  2. Nicholas Nirenberg says

    August 29, 2023 at 5:44 pm

    The challenges involved in performing a quantitative risk assessment include difficulty having accurate data regarding a threat or vulnerability and having the time and resources to fully conduct the assessment. As opposed to a qualitative assessment, a quantitative assessment may require the calculation or gathering of specific values regarding a threat, vulnerability, or outcome of a potential scenario. This can be challenging because these values may require an immense amount of data processing to calculate, or simply do not have concrete values assigned to them. For example, attempting to quantitatively assess the probability of a certain known vulnerability being exploited in a given time frame. Another challenge is that as opposed to a qualitative assessment, a quantitative assessment may require more time and resources to complete, as they may need more amounts of data and more obscure types of data to be accurate.

    Log in to Reply
  3. Celinemary Turner says

    August 29, 2023 at 7:28 pm

    Quantitative risk analysis is a process that involves assessing risks and measuring their potential impacts in numerical terms.and likelihood of various risks that could impact an organization’s information assets. Here are some of the key challenges involved in performing quantitative risk analysis.Data availability:sometimes ,you might not have enough information to make good predictions about risks,some organization might lack comprehensive records of relevant data.Also lot of time and resources are required in doing detailed analysis ,which might not be available.Likewise different opinion could be a challenge,people might not always agree on how likely something is to happen or how bad it could be.

    Log in to Reply
  4. Yannick Rugamba says

    August 29, 2023 at 11:31 pm

    Quantitative analysis of security risks utilizes data to assess threats. Nevertheless, it can be quite challenging, due to factors such as biases, in evaluations, incomplete or unavailable data the nature of interconnected security concerns, divergent methodologies used by different organizations and the inherent uncertainties associated with predictions. In summary despite being driven by data this analysis is not devoid of intricacies and limitations.

    Log in to Reply
  5. Eyup Aslanbay says

    August 30, 2023 at 12:28 am

    The lack of sufficient data is one of the problems in information security risk analysis. Otherwise, having too many variable data will jeopardize the analysis.

    Log in to Reply
  6. Edge Kroll says

    August 30, 2023 at 2:33 am

    Quantitative information security risk analysis while it offers a more measured approach comes with its own set of challenges. If working with an industry that is very niche it may be difficult to find the amount of data necessary to provide accurate assumptions. As always with any other approach personal biases can be a challenge, whether it be in relation to the value of assets, how likely someone thinks something is to happen, etc Things like this can all make it more difficult to create an accurate prediction. The largest challenge of them all is the constantly evolving landscape of threats, as these threats evolve it becomes more difficult to analyze the potential amounts of risk they can bring to a business.

    Log in to Reply
  7. Bo Wang says

    September 3, 2023 at 9:54 pm

    The challenge involved in performing a quantitative information security risk analysis is that it is very expensive, time consuming, and requires significant resources.

    Log in to Reply
  8. Michael Obiukwu says

    September 5, 2023 at 3:43 pm

    Qualitative Information Security Risk Analysis represents an integral part of an organization’s strategy to manage security vulnerabilities efficiently. It facilitates the comprehension of potential security risks that the organization might be susceptible to, enabling mitigation plans to be effected proactively. However, as with every complex process, a slew of challenges are involved in conducting a successful qualitative information security risk analysis.

    Firstly, complex system interactions pose significant challenges to qualitative analysis. Today’s corporate digital systems often have multiple interconnected components that comprise both hardware and software. Understandably, the complexity makes it challenging to identify, assess, and address each vulnerability.

    Adding to the complications, the lack of standardized metrics to assess risk accurately can prove to be a major deterrent. Without comparable metrics, it is challenging to gauge the level of risk accurately. Furthermore, the absence of standardized metrics undermines the risk ranking process and can culminate in a lack of organizational consensus regarding threat prioritization.

    Risk assessment to some extent is also reliant on personal judgments exhibited by the analyst. Such subjectivity tends to introduce biases into the qualitative information security risk analysis. Different analysts can interpret the same information differently, leading to inconsistent results. The biases might lead to overlooked areas or the improper prioritization of threats, thus failing to provide an accurate depiction of the security landscape.

    Another hurdle worth mentioning is the rapid pace of technology evolution along with emerging threat vectors. The dynamic and pervasive nature of digital advancements results in new vulnerabilities continually surfacing. Henceforth, a risk analysis conducted may become obsolete within a short timespan. Similarly, the continuously evolving landscape of threats like developing malware, advancing hacking strategies, and their sophistication can easily outpace the measures established based on existing risk analyses.

    Additionally, there exists the challenge of lacking skilled personnel who can perform qualitative information security risk analyses effectively. A highly complex process, it necessitates individuals gifted in understanding systems, uncovering vulnerabilities, and comprehending risk metrics. With specialized skills in shortage, organizations often struggle to perform these analyses with desired proficiency.

    The qualitative approach’s inherent subjectivity also leads to difficulty in justifying investments in security solutions. As the process relies heavily on expert opinions and judgments, it can be challenging to convincingly rationalize expenditure on risk mitigation strategies to stakeholders without solid data or quantitative proof.

    Michael, OBIUKWU
    MSc ITACS/Fall 2023

    Log in to Reply
  9. Ooreofeoluwa Koyejo says

    September 6, 2023 at 8:10 pm

    When adopting the qualitative approach to risk analysis, it is important to define and communicate the value of the numerical values used in the process of analysis. Risk analysis is generally defined as the assessment of risk using threats and vulnerabilities an organisation is susceptible to. In some contexts, Risk is defined as the impact of threats and vulnerabilities on the confidentiality, integrity and availability of organisational assets.
    Some challenges that might occur with this qualitative approach include but are not limited to:
    1. Outdated asset inventory
    2. Incomplete and inaccurate information on threats and vulnerabilities
    3. Lack of management support
    4. Lack of subject matter input and support
    5. Improper definition of numerical values used for analysis
    6. Improper identification of organisational assets
    7. Data duplication
    8. Lack of communication among risk analysis stakeholders
    9. Timely availability and provision of information
    10. Improper definition of organisation’s risk appetite
    11. Lack of risk analysis expertise

    Log in to Reply
  10. Akiyah says

    September 22, 2023 at 12:42 pm

    test

    Log in to Reply
  11. Hashem Alsharif says

    December 3, 2023 at 9:30 pm

    Before understanding the challenges with performing a quantitative information security risk analysis, one must understand what they are in the first place. This is a process that estimates the probability and the possible impact of threats to the information assets of an organization. In regards to the challenges, there are a few. First, this requires data. And some companies may not have accurate data, some may not have the data at all. It’s important to remember that not everyone properly stores their data and this can cause issues along the way. The next thing is while we can try calculating for probability, we can never be 100% right, and this can cause things being given incorrect probability, thus affecting the company should there be a change in the future. The last one I will be mentioning on here is: compliance and regulations. It can be difficult to follow regulations during a risk analysis.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in