
Annualized Rate Occurrence (ARO):
Annualized Rate Occurrence is the estimated frequency at which a given threat is expected to happen.
ARO can be calculated by using the following formula:
Annualized Loss Expectancy (ALE):
Annualized loss expectancy is the loss expected from the attack of a specific information asset which has been carried over for a year. It is a product of single loss expectancy and the annualized rate of occurrence.
ALE can be calculated by using the following formula:

Explanation of Solution
Calculate ARO for Programmer mistakes:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per week)” as “7” in the equation (1).
Hence, the ARO for programmer mistakes is “52 (approximately)”.
Calculate ARO for Loss if intellectual property:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per year)” as “365” in the equation (1).
Hence, the ARO for Loss if intellectual property is “1 (approximately)”.
Calculate ARO for Software Piracy:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per week)” as “7” in the equation (1).
Hence, the ARO for Software Piracy is “52 (approximately)”.
Calculate ARO for Theft of information (hacker):
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per quarter)” as “
Hence, the ARO for Theft of information (hacker) is “4 (approximately)”.
Calculate ARO for Theft of information (employee):
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per 6 months)” as “
Hence, the ARO for Theft of Theft of information (employee) is “2 (approximately)”.
Calculate ARO for Web defacement:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per months)” as “
Hence, the ARO for Web defacement is “12 (approximately)”.
Calculate ARO for Theft of equipment:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per year)” as “365” in the equation (1).
Hence, the ARO for Theft of equipment is “1 (approximately)”.
Calculate ARO for Viruses, worms, Trojan Horses:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per week)” as “7” in the equation (1).
Hence, the ARO for Viruses, worms, Trojan Horses is “52 (approximately)”.
Calculate ARO for Denial-of-service attacks:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per quarter)” as “
Hence, the ARO for Denial-of-service attacks is “4 (approximately)”.
Calculate ARO for Earthquake:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per 20 years)” as “
Hence, the ARO for Earthquake is “0.05 (approximately)”.
Calculate ARO for Food:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per 10 years)” as “
Hence, the ARO for Food is “0.1 (approximately)”.
Calculate ARO for Fire:
Substitute the value of “One year” as “365” and “Frequency of occurrence (One per 10 years)” as “
Hence, the ARO for Fire is “0.1 (approximately)”.
Calculate ALE for Programmer mistakes:
Substitute the value of “SLE” as “5000” and “ARO” as “52” in the equation (2).
Hence, the ALE for programmer mistakes is “260000”.
Calculate ALE for Loss if intellectual property:
Substitute the value of “SLE” as “75000” and “ARO” as “1” in the equation (2).
Hence, the ALE for Loss if intellectual property is “75000”.
Calculate ALE for Software Piracy:
Substitute the value of “SLE” as “500” and “ARO” as “52” in the equation (2).
Hence, the ALE for Software Piracy is “26000”.
Calculate ALE for Theft of information(hacker):
Substitute the value of “SLE” as “2500” and “ARO” as “4” in the equation (2).
Hence, the ALE for Theft of information (hacker)is “10000”.
Calculate ALE for Theft of information (employee)
Substitute the value of “SLE” as “5000” and “ARO” as “2” in the equation (2).
Hence, the ALE for Theft of information (employee) is “10000”.
Calculate ALE for Web defacement:
Substitute the value of “SLE” as “500” and “ARO” as “12” in the equation (2).
Hence, the ALE for Web defacement is “6000”.
Calculate ALE for Theft of equipment:
Substitute the value of “SLE” as “5000” and “ARO” as “1” in the equation (2).
Hence, the ALE for Theft of equipment is “6000”.
Calculate ALE for Viruses, worms, Trojan Horses:
Substitute the value of “SLE” as “1500” and “ARO” as “52” in the equation (2).
Hence, the ALE for Viruses, worms, Trojan Horses is “78000”.
Calculate ALE for Denial-of-service attacks:
Substitute the value of “SLE” as “2500” and “ARO” as “4” in the equation (2).
Hence, the ALE for Denial-of-service attacks is “10000”.
Calculate ALE for Earthquake:
Substitute the value of “SLE” as “250000” and “ARO” as “0.05” in the equation (2).
Hence, the ALE for Earthquake is “12500”.
Calculate ALE for Food:
Substitute the value of “SLE” as “250000” and “ARO” as “0.1” in the equation (2).
Hence, the ALE for Food is “25000”.
Calculate ALE for Fire:
Substitute the value of “SLE” as “500000” and “ARO” as “0.1” in the equation (2).
Hence, the ALE for Fire is “50000”.
ARO and ALE table for all the threat cost is given below:
ARO and ALE threat cost | ARO | ALE |
Programmer mistakes | 52 | $260,000 |
Loss if intellectual property | 1 | $75,000 |
Software Piracy | 52 | $26,000 |
Theft of information(hacker) | 4 | $10,000 |
Theft of information (employee) | 2 | $10,000 |
Web defacement | 12 | $6,000 |
Theft of equipment | 1 | $5,000 |
Viruses, worms, Trojan Horses | 52 | $78,000 |
Denial-of-service attacks | 4 | $10,000 |
Earthquake | 0.05 | $12,500 |
Food | 0.1 | $25,000 |
Fire | 0.1 | $50,000 |
Want to see more full solutions like this?
Chapter 5 Solutions
Principles Of Information Security, Loose-leaf Version
- JOB UPDATE Apply on- VinkJobs.com @ OR Search "Vinkjobs.com" on Google COMPANY JOB PROFILE JOB LOCATION INTELLIFLO APPLICATION DEVELOPER MULTIPLE CITIES GLOBAL LOGIC SOFTWARE ENGINEER/SDET DELHI NCR SWIGGY SOFTWARE DEVELOPMENT BENGALURU AVALARA SOFTWARE ENGINEER (WFH) MULTIPLE CITIES LENSKART FULL STACK DEVELOPER MULTIPLE CITIES ACCENTURE MEDPACE IT CUST SERVICE SOFTWARE ENGINEER MUMBAI MUMBAI GENPACT BUSINESS ANALYST DELHI NCR WELOCALIZE WORK FROM HOME MULTIPLE CITIES NTT DATA BPO ASSOCIATE DELHI NCRarrow_forward+is+how+many+tree+in+ipl&rlz=1C1GCEA_enIN1122IN1122&oq=1+dot+ball+is+how+many+tree+in Google 1 dot ball is how many tree in ipl All Images News Videos Short videos Shopping Web More 500 trees 4) हिन्दी में In English The step was a part of the Board of Control for Cricket in India's green initiative. The BCCI, having partnered with the Tata Group, has promised to plant as many as 500 trees for every dot ball bowled in the Indian Premier League. 25 Mar 2025 Sportstar https://sportstar.thehindu.com > Cricket IPL IPL News IPL 2025: Why are green tree symbols showing up for every ... A Translate to fo-d About featured snippets . Feedback Toolsarrow_forwardPastner Brands is a calendar-year firm with operations in several countries. As part of its executive compensation plan, at January 1, 2024, the company issued 480,000 executive stock options permitting executives to buy 480,000 shares of Pastner stock for $38 per share. One-fourth of the options vest in each of the next four years beginning at December 31, 2024 (graded vesting). Pastner elects to separate the total award into four groups (or tranches) according to the year in which they vest and measures the compensation cost for each vesting date as a separate award. The fair value of each tranche is estimated at January 1, 2024, as follows: Vesting Date Amount Fair Value Vesting per Option: December 31, 2024 25% $ 3.90 December 31, 2025 25% $ 4.40 25% $ 4.90 25% $ 5.40 December 31, 2026 December 31, 2027 Required: 1. Determine the compensation expense related to the options to be recorded each year 2024-2027, assuming Pastner allocates the compensation cost for each of the four…arrow_forward
- What is one benefit with regards to time complexity of using a Doubly Linked List as opposed to an Array when implementing a Deque?arrow_forwardWhat is one benefit with regards to space complexity of using a Doubly Linked List as opposed to an Array when implementing a Deque?arrow_forwardWhich basic data structure (Doubly Linked List, Singly Linked List, Array) would you use to implement a Stack? Why?arrow_forward
- Did you comment all methods in the Deque class to include 1. The method's behavior 2. Arguments that are passed to the method (if any), their expected types, and what they are used for 3. What the method returns (if any) 4. A description of the behavior of each line in the methodarrow_forwardWhy use a Doubly Linked List as opposed to a Singly Linked List for a Deque?arrow_forwardthis module is java 731 , follow all instructions and make sure the outputs are like what they expect and make sure the code is 100% correct . include all comments , layout and structure to be perfect too, thanks. Question 1: E-Hailing Bicycle Management System Case Study:An e-hailing company that rents out bicycles needs a system to manage its bicycles, users, and borrowing process. Each user can borrow up to 2 bicycles at a time, specifically for families with children 18 years or below. The system must track the bicycles (name, make, type, and availability) and users (name, ID, and borrowed bicycles). The company also wants to ensure that the system uses a multidimensional array to store information about the bicycles. Requirements: Add and View Bicycles: Borrow Bicycles: Return Bicycles Display Borrowed Bicycles and Search for a bicycle Create a menu-driven program to implement the above. Sample Output: Add Bicycle View All Bicycles Borrow Bicycle Return…arrow_forward
- Add a method called transfer () to the BankAccount class, that takes in an amount and destinationAccount as input and transfer the funds from current account to destination account. This method should return the balance of the current account after the transfer, also should check for the sufficient balance in current account before proceeding the transfer and if there is insufficient balance return an error message "Insufficient balance". Modify the BankAccount Test class, so that it calls the transfer () method and prints the balance after transfer. Make sure that the transfer() method updates the balance of both the current account and the destination account.arrow_forward• Create a public method called deposit() that takes in an amount of type double as input and adds the amount to the current balance. This method should also return the updated balance. • Create another public method called withdraw() that takes in an amount of type double as input, checks if the withdrawal amount is less than the current balance, and if so, subtracts the amount from the balance. If the withdrawal amount is greater than the current balance, the method should return an error message "Insufficient balance". • Create a public method getAccountInfo() that returns the account information in the format "Account Number: xxxxx, Account Holder: John Doe, Account Type: SAVINGS/CHECKING, Balance: $xxxX.XX". • Finally, create a constructor method that takes in the account number, account holder name, initial balance and account type as input and initializes the corresponding instance variables. In the BankAccount class, make sure to use the private access modifier for the instance…arrow_forwardCreate a BankAccount Test class that contains a main() method that instantiates an object of type BankAccount, with account number of 12345, account holder name of "John Doe", initial balance of $1000 and account type as SAVINGS . Then use the deposit() and withdraw() methods of the object to deposit $500 and withdraw $300. Finally, use the getAccountInfo() method to print the current account information. Use the getAccountInfo() method to verify that the deposit and withdrawal actions are performed correctly and that the account information is updated accordingly.arrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningInformation Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage Learning
- Information Technology Project ManagementComputer ScienceISBN:9781285452340Author:Kathy SchwalbePublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L




