Skip to content
This article is for educational purposes. We encourage you to verify with official sources.

Risk Assessment and Impact Analysis

Quantify cybersecurity risks and financial impacts for New Zealand organizations using standard risk formulas

Risk Score Formula approximation
R=T×V×I
SymboleSignificationUnité
RRisk score
Normalized between 0 and 100
(dimensionless)
TThreat level
Normalized between 0 and 1, e.g., 0.8 for high threat
(dimensionless)
VVulnerability level
Normalized between 0 and 1, e.g., 0.7 for medium vulnerability
(dimensionless)
IImpact score
Normalized between 0 and 1, e.g., 0.9 for critical impact
(dimensionless)

Exemple : For a Wellington hospital system with T=0.85, V=0.75, I=0.92, the risk score R = 0.85 × 0.75 × 0.92 = 0.5865

Annualized Loss Expectancy (ALE) law
ALE=SLE×ARO
SymboleSignificationUnité
ALEAnnualized Loss Expectancy
Expected yearly financial loss from cyber incidents
NZD/year
SLESingle Loss Expectancy
Financial loss from a single incident
NZD
AROAnnualized Rate of Occurrence
Expected number of incidents per year
(occurrences/year)

Dimensions : [NZD]

Exemple : A Christchurch retail chain has SLE = 250 000 NZD for ransomware and ARO = 0.15. ALE = 250 000 × 0.15 = 37 500 NZD/year

Single Loss Expectancy (SLE) definition
SLE=AV×EF
SymboleSignificationUnité
SLESingle Loss Expectancy
Financial impact of a single security incident
NZD
AVAsset Value
Value of the asset in New Zealand Dollars
NZD
EFExposure Factor
Fraction of asset value lost (0 to 1), e.g., 0.4 for 40% loss
(dimensionless)

Dimensions : [NZD]

Exemple : A Hamilton logistics company's delivery tracking system is valued at AV = 1 200 000 NZD. If EF = 0.25 during a cyber incident, SLE = 1 200 000 × 0.25 = 300 000 NZD

Security Incident Metrics

Key performance indicators for measuring SIEM effectiveness in detecting and responding to incidents

Mean Time Between Incidents (MTBI) definition
MTBI=TtotalN
SymboleSignificationUnité
MTBIMean Time Between Incidents
Average time between security incidents
hours
T_totalTotal operating time
Total monitoring period in hours
hours
NNumber of incidents
Total incidents during monitoring period
(dimensionless)

Dimensions : [T]

Exemple : A Wellington university's SIEM monitored for Ttotal = 8 760 h (1 year) and recorded N = 24 incidents. MTBI = 8 760 / 24 = 365 h ≈ 15.2 days

Mean Time To Detect (MTTD) definition
MTTD=i=1Ntd,iN
SymboleSignificationUnité
MTTDMean Time To Detect
Average time to detect a security incident
minutes
t_d,iDetection time for incident i
Time from incident occurrence to detection
minutes
NNumber of incidents
Total incidents with detection times recorded
(dimensionless)

Dimensions : [T]

Exemple : An Auckland bank's SIEM recorded detection times of [12, 45, 22, 33, 18] minutes for 5 incidents. MTTD = (12+45+22+33+18)/5 = 26 minutes

Mean Time To Respond (MTTR) definition
MTTR=i=1Ntr,iN
SymboleSignificationUnité
MTTRMean Time To Respond
Average time from detection to containment
minutes
t_r,iResponse time for incident i
Time from detection to incident containment
minutes
NNumber of incidents
Total incidents with response times recorded
(dimensionless)

Dimensions : [T]

Exemple : A Christchurch government agency's SOC recorded response times of [30, 45, 25, 60, 35] minutes for 5 incidents. MTTR = (30+45+25+60+35)/5 = 39 minutes

Security Incident Rate definition
R=NT×100
SymboleSignificationUnité
RIncident rate per 100 days
Standardized incident frequency metric
(incidents/100 days)
NNumber of incidents
Total incidents during monitoring period
(dimensionless)
TMonitoring time in days
Total monitoring duration in days
days

Dimensions : [T1]

Exemple : A Dunedin tech company recorded 24 incidents over T = 180 days. Incident rate R = (24/180) × 100 = 13.3 incidents per 100 days

Log Management and Data Volume

Calculate storage requirements and data volumes for SIEM log collection in New Zealand environments

Daily Log Volume Calculation approximation
Vdaily=E×86400×S
SymboleSignificationUnité
V_dailyDaily log volume
Total log data generated per day
bytes
EEvents per second
Average event rate across all monitored systems
events/s
SAverage log size
Average size of each log entry in bytes
bytes

Dimensions : [L3]

Exemple : A Tauranga cloud hosting provider generates E = 5 000 events/s with S = 256 B per log. Vdaily = 5 000 × 86 400 × 256 = 110 592 000 000 B ≈ 110.6 GB/day

Log Retention Requirement definition
Vtotal=Vdaily×D
SymboleSignificationUnité
V_totalTotal storage required
Total storage needed for log retention period
bytes
V_dailyDaily log volume
Log volume generated each day
bytes/day
DRetention period in days
Required retention period per compliance framework
days

Dimensions : [L3]

Exemple : PCI DSS requires D = 365 days retention. With Vdaily = 110.6 GB, Vtotal = 110.6 × 365 ≈ 40 369 GB ≈ 40.4 TB

Log Compression Ratio definition
C=VuncompressedVcompressedVuncompressed×100
SymboleSignificationUnité
CCompression ratio
Percentage reduction in log storage size
percentage
V_uncompressedUncompressed volume
Original log file size before compression
bytes
V_compressedCompressed volume
Log file size after compression
bytes

Dimensions : [1]

Exemple : A Wellington ISP's logs compress from 500 GB to 125 GB. C = ((500 000 - 125 000)/500 000) × 100 = 75% compression ratio

Compliance and Audit Scoring

Score cybersecurity compliance against standards like NIST CSF and PCI DSS for New Zealand organizations

Compliance Score definition
C=PT×100
SymboleSignificationUnité
CCompliance score
Percentage of controls satisfied
percentage
PControls passed
Number of controls meeting requirements
(dimensionless)
TTotal controls
Total number of controls in framework
(dimensionless)

Dimensions : [1]

Exemple : A Hamilton manufacturer assessed 92 out of 100 NIST CSF controls. Compliance score C = (92/100) × 100 = 92%

Audit Finding Severity Score definition
S=i=1Nwi×si
SymboleSignificationUnité
SSeverity score
Weighted severity of audit findings
(dimensionless)
w_iWeight factor for finding i
Importance weight (e.g., 3 for critical, 2 for high, 1 for medium)
(dimensionless)
s_iSeverity level for finding i
Severity score (e.g., 5 for critical, 3 for high)
(dimensionless)
NNumber of findings
Total audit findings
(dimensionless)

Dimensions : [1]

Exemple : A Christchurch hospital audit found 2 critical (w=3, s=5) and 4 high (w=2, s=3) findings. S = (3×5 + 3×5) + (2×3 + 2×3 + 2×3 + 2×3) = 30 + 24 = 54

PCI DSS Compliance Coverage definition
PPCI=R12×100
SymboleSignificationUnité
P_PCIPCI DSS compliance percentage
Percentage of PCI DSS requirements met
percentage
RRequirements satisfied
Number of PCI DSS requirements satisfied (out of 12 families)
(dimensionless)

Dimensions : [1]

Exemple : A Queenstown payment processor satisfied 10 out of 12 PCI DSS requirement families. PPCI = (10/12) × 100 = 83.3% compliance

Incident Response Timelines

Measure and optimize response times for security incidents in New Zealand SOC environments

Incident Response Time SLA definition
Tresponse=tdetect+tcontain+teradicate
SymboleSignificationUnité
T_responseTotal response time
Total time from incident detection to eradication
minutes
t_detectDetection time
Time from incident occurrence to detection
minutes
t_containContainment time
Time to contain the incident and prevent spread
minutes
t_eradicateEradication time
Time to remove the threat and restore systems
minutes

Dimensions : [T]

Exemple : A Napier winery's ransomware incident had tdetect=15, tcontain=45, teradicate=240 minutes. Tresponse = 15 + 45 + 240 = 300 minutes (5 hours)

Mean Time to Recovery (MTTR) definition
MTTR=trecovertdetect
SymboleSignificationUnité
MTTRMean Time to Recovery
Time from detection to full system recovery
minutes
t_recoverRecovery time
Time when systems are fully restored
minutes
t_detectDetection time
Time when incident was detected
minutes

Dimensions : [T]

Exemple : A Wellington university detected a phishing incident at tdetect=09:30 and recovered at trecover=14:15. MTTR = (14×60+15) - (9×60+30) = 855 - 570 = 285 minutes

Incident Escalation Time definition
Tescalate=tassigntdetect
SymboleSignificationUnité
T_escalateEscalation time
Time from detection to incident assignment
minutes
t_assignAssignment time
Time when incident is assigned to response team
minutes
t_detectDetection time
Time when incident was detected
minutes

Dimensions : [T]

Exemple : An Auckland bank detected a DDoS attack at 10:00 and assigned it at 10:22. Tescalate = 22 minutes

Sources

  1. en.wikipedia.org
  2. doi.org
  3. api.semanticscholar.org
  4. csrc.nist.gov
  5. www.federalregister.gov
  6. www.ftc.gov
  7. www.hhs.gov
  8. search.worldcat.org
  9. www.pcisecuritystandards.org
  10. www.sans.org
  11. ui.adsabs.harvard.edu
  12. web.archive.org
  13. www.ibm.com
  14. www.drdobbs.com
  15. play.google.com