Skip to content
crmnuggets
Menu
  • Home
  • CRM
    • SCRUM
    • ITIL 4
  • ABOUT
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu
Deterministic Analysis and Probabilistic Analysis In Cybersecurity

Probabilistic Analysis In Cyber Security: How To Determine The Likelihood Of Events

Posted on April 26, 2023September 21, 2023 by Adeniyi Salau

Statistical techniques can be used to evaluate the risk that exploits will be successful in a given network. This type of analysis can help decision-makers to better evaluate the cost of mitigating a threat with the damage that an exploit could cause.
Two general approaches used to do this are deterministic and probabilistic analysis.
The deterministic analysis evaluates risk based on what is known about a vulnerability.
It assumes that for an exploit to be successful all prior steps in the exploit process must also be successful.
This type of risk analysis can only describe the worst case. However, many threat actors, although aware of the process to carry out an exploit, may lack the knowledge or expertise to successfully complete each step on the path to a successful exploit.
This can give the cybersecurity analyst an opportunity to detect the exploit and stop it before it proceeds any further.
The probabilistic analysis estimates the potential success of an exploit by estimating the likelihood that if one step in an exploit has successfully been completed that the next step will also be successful.
Probabilistic analysis is especially useful in real-time network security analysis in which numerous variables are at play and a given threat actor can make unknown decisions as an exploit is pursued.

 

The probabilistic analysis relies on statistical techniques that are designed to estimate the probability that an event will occur based on the likelihood that prior events will occur.
Using this type of analysis, the most likely paths that an exploit will take can be estimated and the attention of security personnel can be focused on preventing or detecting the most likely exploit.
In a deterministic analysis, all of the information to accomplish an exploit is assumed to be known. The characteristics of the exploit, such as the use of specific port numbers, are known either from other instances of the exploit or because standardized ports are in use.
In probabilistic analysis, it is assumed that the port numbers that will be used can only be predicted with some degree of confidence.
In this situation, an exploit that uses dynamic port numbers, for example, cannot be analyzed deterministically. Such exploits have been optimized to avoid detection by firewalls that use static rules.

 

The two approaches are summarized below.

  • Deterministic Analysis – For an exploit to be successful, all prior steps in the exploit must also be successful. The cybersecurity analyst knows the steps for a successful exploit.
  • Probabilistic Analysis – Statistical techniques are used to determine the probability that a successful exploit will occur based on the likelihood that each step in the exploit will succeed.

 

Do you enjoy this article, add Our Posts to your Reading List.

Action Point 

PS: I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you could drop your comment. Thanks in anticipation.

Fact Check Policy

CRMNuggets is committed to fact-checking in a fair, transparent and non-partisan manner. Therefore, if you’ve found an error in any of our reports, be it factual, editorial, or an outdated post, please contact us to tell us about it.

 

Become Part Of our Fan Base on Facebook. Click Here.
Follow Us on Twitter. Click Here.
Many Crypto. One place. Use Roqqu

Hi, I now use RavenBank to send, receive and save money. I also pay my bills with ease, you should try it out too

 

OUR MISSION

To create well-reached contents that will increase the intellectual prowess of our readers. 

OUR VISION

To become a reference point in the blogging space by the year 2030. We want to be among the first 30 blogs in Nigeria. 

Official Social Media Pages for crmnuggets.com

To Get Email Updates when we post new contents, Click Here.

 Join Our Telegram Channel: CRMNUGGETS Twitter: @crmngr
​Facebook Group: @AdeniyiSalauFacebook Page: CRMNuggets
Instagram: @crmnigeriablog
Pinterest: CRMNUGGETSThreads@crmnuggets

Tiktok: CRMNUGGETS

Fact Check Policy
Contact Us
Sharing Is Caring. If you enjoy this article, help us share with others.

DOWNLOAD 10 DIGITAL MARKETING EBOOKS FOR FREE

 Provided by SendPulse
truehost

Related Posts:

  • Series 12: Latest CAPM Questions And Answers
    Series 12: Latest CAPM Questions And Answers
  • CAPM Series 2: CAPM Exam Dumps 2023 For CAPM Exam Takers
    CAPM Series 2: CAPM Exam Dumps 2023 For CAPM Exam Takers
  • CAPM Questions
    Series 13: Latest CAPM Questions And Answers
  • CAPM Questions
    Series 14: Latest CAPM Questions And Answers
  • Highlighting Common Vulnerability Scoring System
    Common Vulnerability Scoring System: Facts To Note
  • Latest CAPM Exam Dumbs 2023 For CAPM Exam Takers
    1000 CAPM Exam Dumps 2023 For CAPM Exam Takers

Powered by Contextual Related Posts

Post navigation

← Enterprise Patch Management: How To Go About It
RCCG SOD Year 1: Know Yourself. Part 5. →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

TRENDING

  • Series 12: Latest CAPM Questions And Answers
    Series 12: Latest CAPM Questions And Answers
  • CAPM Series 2: CAPM Exam Dumps 2023 For CAPM Exam Takers
    CAPM Series 2: CAPM Exam Dumps 2023 For CAPM Exam Takers
  • CAPM Questions
    Series 13: Latest CAPM Questions And Answers
  • CAPM Questions
    Series 14: Latest CAPM Questions And Answers
  • Highlighting Common Vulnerability Scoring System
    Common Vulnerability Scoring System: Facts To Note
  • Latest CAPM Exam Dumbs 2023 For CAPM Exam Takers
    1000 CAPM Exam Dumps 2023 For CAPM Exam Takers
  • ITIL 4
    Series 8: CAPM Latest Questions And Answers
  • PMP Test Questions For Practice & Preparation
    119 PMP Test Questions For Practice & Preparation
  • Health Benefits Of Vigor Essentials Capsule
    Series 6: Latest CAPM Questions And Answers
  • Series 9: Latest CAPM Questions And Answers
    Series 9: Latest CAPM Questions And Answers

Powered by Contextual Related Posts

CHECK THIS

© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme