Quantitative Framework CyberSecurity Risk Evaluation
Quantitative Framework CyberSecurity Risk Evaluation
Abstract
In today’s technology-driven environment, cybersecurity threats impact every facet of business
operations, from data integrity to regulatory compliance and reputation. Traditional methods of risk
assessment often lack the depth to address both specific vulnerabilities and general infrastructure
risks, leading to gaps in understanding and mitigating potential threats.
This white paper presents a quantitative framework for cybersecurity risk assessment that
addresses these gaps by evaluating two primary categories of risk: (1) CVE-based risk, which
assesses risks tied to known vulnerabilities, and (2) non-CVE infrastructure risk, which evaluates
the risk associated with aging systems or outdated technology even when specific vulnerabilities
are not present. Borrowing principles from actuarial science, this framework quantifies
cybersecurity risk in a way that is transparent and repeatable, allowing both technical teams and
executives to make informed decisions based on a consistent, holistic view of risk.
1. Introduction
The Need for a Quantitative Approach to Cybersecurity Risk
Cybersecurity is no longer solely the responsibility of IT teams; it is a critical business issue that
affects every layer of an organization. Despite this, many companies continue to assess risk using
qualitative or single-dimensional methods that often fall short of capturing the full scope of
cybersecurity threats. These methods can make it challenging for executives and other non-
technical stakeholders to understand the true level of risk and prioritize resources effectively.
This paper introduces a quantitative approach to cybersecurity risk assessment that leverages the
mathematical rigor of actuarial science. Actuarial science, traditionally used to measure financial
risks with uncertain outcomes, provides a foundation for this model, enabling organizations to
apply a standardized, repeatable methodology to cybersecurity risk assessment.
The objective of this white paper is to offer a structured approach that addresses two main risk
areas within cybersecurity:
• CVE-Based Risk: Assesses risks associated with known vulnerabilities using Common
Vulnerabilities and Exposures (CVE) data.
• Non-CVE Infrastructure Risk: Evaluates risk from outdated or legacy infrastructure, which
can introduce risk even without specific vulnerabilities.
Through this two-part model, organizations can assess both immediate and latent cybersecurity
risks, facilitating communication between technical teams, executives, and other stakeholders.
This framework can help organizations align cybersecurity risk assessment with business strategy,
enabling informed decision-making across departments.
• Non-CVE Infrastructure Risk Formula: Quantifies risk arising from outdated or legacy
infrastructure, even in the absence of specific vulnerabilities.
These formulas offer flexibility, allowing organizations to assess each risk area independently. This
approach ensures that each formula remains focused on its distinct category, allowing for a
combined score when both risks are present or separate evaluations when only one category
applies.
3. CVE-Based Risk Formula
The CVE-based formula is designed to assess the risk associated with known vulnerabilities within
an organization’s systems. This formula aggregates multiple factors, including the age of the
security framework, the organization’s internal management capability, third-party dependencies,
and the resilience of the organization’s brand to potential reputational harm. Each factor is carefully
weighted to provide a balanced, comprehensive view of vulnerability-related risk.
Formula:
Where:
• F: Framework Compliance Age Factor — Measures the age and frequency of updates to
the organization’s security framework.
• T: Third-Party Risk Displacement — Reflects how much risk is outsourced to third parties.
• 5/B: Brand Resilience — Inversely scaled to reduce risk for brands with high resilience,
while low resilience increases risk.
Each component in the CVE risk formula captures a distinct element of risk associated with
vulnerabilities. Let’s review each factor in detail.
o Purpose: This factor captures how outdated the organization’s security framework
is, based on the last time it was updated or audited.
o Formula:
▪ Audit Age: The number of years since the last formal security audit.
o Purpose: This factor accounts for the organization’s reliance on third parties to
manage certain cybersecurity responsibilities.
o Formula:
o Explanation:
▪ Displacement Weight: A constant (e.g., 0.2) that reduces internal risk when
third-party support is present.
o Rationale: While third-party risk displacement can lower internal risk, it introduces
new dependencies, which this factor appropriately captures.
o Formula:
o Explanation:
▪ Years Since Training: The number of years since the last training session.
o Rationale: Higher capability and recent training lower risk, while low capability or
outdated skills increase risk.
o Formula:
5/B
o Explanation:
▪ This factor is inversely scaled so that high resilience reduces risk (e.g., a
high resilience score of 5 results in a lower risk multiplier of 1).
o Rationale: High resilience mitigates the impact of potential threats, so this factor
reduces risk for resilient brands.
o Formula:
C=∑(Exploitability×Impact×CVE Weight)
o Explanation: Higher CVE scores result in higher risk, with weights reflecting the
severity of each CVE.
o Purpose: Multiplies the risk score based on industry-specific needs, with critical
sectors receiving higher weights.
o Rationale: High-risk industries face greater regulatory scrutiny and are more
vulnerable to reputational damage, so this factor appropriately adjusts the risk.
4. Non-CVE Infrastructure Risk Formula
The non-CVE risk formula assesses risks associated with outdated or legacy infrastructure. This
formula captures factors such as system age, operational criticality, dependency, and mitigation
measures, allowing organizations to quantify infrastructure-related risks even in the absence of
specific vulnerabilities.
Formula:
RNon-CVE=(A×C×D+I)×S
Where:
• A: Infrastructure Age Factor — Reflects the age and outdated nature of infrastructure.
• I: Infrastructure Mitigation Factor — Accounts for controls that reduce exposure, such as
segmentation.
Each element of the non-CVE formula addresses a different aspect of risk associated with
infrastructure age and dependence. Here’s how each factor contributes to the overall risk score.
o Purpose: Measures the risk associated with the age of infrastructure, which tends
to increase as systems become older and possibly obsolete.
o Formula:
o Explanation:
▪ Base Age Multiplier: A constant (e.g., 1.2) that reflects the added risk as
infrastructure ages. This multiplier increases risk proportionally with age.
▪ Years Since Last Major Upgrade: The number of years since the
infrastructure was last upgraded significantly.
o Rationale: Older infrastructure may lack modern security features and vendor
support, which can make it more vulnerable to potential threats. This factor ensures
that as systems age, the risk score reflects the increasing risk of obsolescence.
o Scale: 1 to 5, where:
o Purpose: Measures how much the organization relies on the infrastructure. High
dependency means many systems or processes are tied to this infrastructure,
increasing risk if it becomes compromised.
o Scale: 1 to 5, where:
o Rationale: This factor captures the additional risk posed by infrastructure on which
many parts of the business depend. High dependency amplifies the risk, reflecting
the interconnected nature of operations.
o Explanation:
o Rationale: This factor effectively reduces the risk if the organization has
implemented protective measures, making it less susceptible to the weaknesses
associated with older infrastructure.
o Purpose: Adjusts the risk score based on the organization’s industry. Critical
sectors like finance, healthcare, and government face higher regulatory and
operational risks and thus receive a higher multiplier.
o Scale:
Aubrey holds an Associate of Applied Science in Intelligence Studies, a Bachelor of Arts in General
Studies, and is currently pursuing an MBA with a concentration in cybersecurity at the University of
New Hampshire. His certifications include CISSP, underscoring his commitment to advancing his
knowledge and contributions to the cybersecurity field. Aubrey's work combines technical rigor
with strategic insight, making him a valued resource in cybersecurity risk assessment and
intelligence.
Appendix:
Sample Data for CVE-Based and Non-CVE Risk Calculations
This appendix provides examples of how to apply both formulas to real-world scenarios, illustrating
how each component influences the risk score.
• Framework Compliance Age (F): 1.5 (older framework with moderate audit frequency)
o F = 1.5
o T = 0.8
o M = 0.5
o B = 5/5 = 1
o C = 40
o S = 1.3
RCVE=(F×T×M+B+C)×S
RCVE=(1.5×0.8×0.5+1+40)×1.3=54.08
Interpretation: With a score of 54.08, TechSecure Inc. falls in the Elevated Risk range, suggesting
proactive mitigation.
Scenario: FinTech Services, a finance company with outdated core financial processing systems.
• Infrastructure Age (A): 10 years since last major upgrade (Base Age Multiplier = 1.2)
• Criticality (C): 5 (highly critical to daily operations)
• Infrastructure Mitigation (I): 2.0 with no segmentation (Base Infrastructure Score = 2.0)
o A=1.2×10=12
o C=5
o D=5
o I=2.0
o S=1.4
RNon-CVE=(A×C×D+I)×S
RNon-CVE=(12×5×5+2.0)×1.4=422.8
Interpretation: With a score of 422.8, FinTech Services has a High Risk level, indicating a need for
immediate infrastructure improvements.
Sector Weight Categories and Mappings
Based on sector-specific factors, industries are grouped into low, medium, and high risk, each
assigned a weight within a specified range. Below is a table mapping industries to sector weights.
Sector Weight
Risk Level Sector
(S)
Medium
Legal, Real Estate, Construction, Non-profit, Utilities 1.2
Risk
o While these sectors may face risks, they are less frequently targeted by
sophisticated attacks, and the impact of a breach may be lower.
o Utilities, Legal, and Real Estate sectors, categorized as medium risk, handle
moderately sensitive information and have increasing regulatory expectations.
These industries face higher exposure to third-party and operational risks.
o The Energy sector is also high risk due to the critical nature of its infrastructure and
potential implications of a cyber breach.
Weights for high-risk industries range from 1.3 to 1.5, with Finance and Healthcare often at the top
end due to data privacy concerns and high regulatory burdens.
CVE-Based Risk Score Table
Risk
Score Risk Level Description Recommended Action
Range