Subadditivity effect

Category:

Not Enough Meaning

Definition:

The tendency to perceive the probability of the whole as less than the sum of its parts.

Published on
September 4, 2024
Updated on
September 4, 2024
Not Enough Meaning

Learning Objectives

What you will learn:
Understand the concept of the Subadditivity effect
Recognize the Impact of the Subadditivity effect in cybersecurity
Strategies to mitigate Subadditivity effect

Other Cognitive Biases

Author

Joshua Crumbaugh
Joshua Crumbaugh
Social Engineer

Subscribe to our newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The Psychology behind the Subadditivity effect:

The subadditivity effect exemplifies a significant psychological phenomenon where individuals underestimate the likelihood of a combined event by perceiving the total probability as less than the sum of its individual components. This cognitive bias arises from the brain's tendency to simplify complex probabilistic information, often leading to a fragmented view that hampers accurate risk assessment. In this context, individuals may focus on individual probabilities in isolation, neglecting the interactions and dependencies that exist between them. As a result, the overall probability of multiple events occurring simultaneously is not fully appreciated, which can lead to critical misjudgments in decision-making.


This bias can have profound implications, particularly in environments where accurate risk perception is crucial, such as in finance or cybersecurity. When individuals perceive the cumulative risk as lower than it actually is, they may become complacent, underestimating potential threats or failing to take necessary precautions. For instance, in cybersecurity, users might downplay the likelihood of a multi-faceted attack, believing that the risks associated with each component are individually manageable. This cognitive simplification can create vulnerabilities that malicious actors exploit. Thus, awareness of the subadditivity effect is essential for fostering a more nuanced understanding of probabilities, enabling better decision-making and enhancing resilience against manipulation and risk in various domains.

How To Differentiate the Subadditivity effect from other cognitive biases?

The subadditivity effect is meaningfully distinct from other cognitive biases in its focus on how individuals assess probabilities in a way that leads them to underestimate the likelihood of a combined event. Unlike other biases that may involve overestimating or misjudging risk, the subadditivity effect specifically highlights the cognitive simplification process that results in a fragmented view of probabilities. This tendency can lead to significant miscalculations in decision-making, as people fail to recognize that the total probability of multiple events occurring is often greater than the sum of their individual probabilities.

How does the Subadditivity effect apply to Business Operations?

Scenario:

In a mid-sized financial institution, the cybersecurity team was tasked with evaluating the overall risk of a potential multi-layered cyber attack. The attack could involve phishing, malware, and data breaches occurring simultaneously. The team assessed the individual probabilities of each threat occurring within a year: phishing (10%), malware (5%), and data breaches (3%). However, due to the subadditivity effect, the team concluded that the combined risk of all three events was simply the sum of these probabilities (18%).


Application:

The cybersecurity team decided to focus on mitigating individual threats based on their isolated probabilities rather than considering the compounded risk of simultaneous attacks. As a result, they implemented measures to combat phishing attacks and malware but overlooked potential vulnerabilities arising from the interactions between these threats. They believed that managing each threat independently was sufficient to protect the organization.


Results:

Several months later, the institution experienced a coordinated cyber attack that combined phishing attempts with malware deployment, leading to a significant data breach. The attackers exploited the vulnerabilities created by the lack of comprehensive risk assessment. The financial institution suffered substantial financial losses, reputational damage, and regulatory scrutiny due to the compromised data.


Conclusion:

This example illustrates how the subadditivity effect can lead cybersecurity professionals to underestimate the total risk of multiple threats. By failing to recognize the compounded probability of a multi-faceted attack, the institution became vulnerable to a coordinated threat that could have been mitigated with a more holistic risk assessment approach. For businesses, understanding and addressing the subadditivity effect is crucial for enhancing cybersecurity measures and avoiding significant losses due to preventable vulnerabilities.


How do Hackers Exploit the Subadditivity effect?

Scenario:

A social engineer targets employees of a large corporation to execute a phishing campaign. The attacker knows that the employees have a fragmented understanding of risks associated with multiple threats. They craft a sophisticated email that combines elements of urgency, authority, and familiarity, leading employees to believe that the likelihood of falling for the phishing attempt is lower than it actually is.


Application:

The social engineer leverages the subadditivity effect by highlighting individual threats in the email communications. They emphasize that while phishing is a risk (10%), and the risk of a data breach is low (3%), the likelihood of both occurring together is perceived as negligible. This manipulation causes employees to downplay the threat, believing that if they handle each risk separately, they will be safe. The attacker provides a seemingly legitimate link that leads to a fake login page, further decreasing the employees' perception of risk.


Results:

Many employees, following the social engineer's instructions, fall victim to the phishing attack by inputting their credentials on the fake site. As a result, the attacker gains unauthorized access to sensitive company data, including financial information and employee records. The corporation suffers a significant breach of trust, faces regulatory penalties, and must deal with the fallout of compromised data security.


Conclusion:

This example demonstrates how the subadditivity effect can be exploited by social engineers to manipulate employees' perceptions of risk. By simplifying the understanding of threats and emphasizing isolated probabilities, social engineers can effectively lower the defenses of individuals and organizations, leading to successful attacks. Businesses must educate their employees about the compounded risks of multi-faceted threats and implement robust security training to mitigate vulnerabilities against social engineering tactics.


How To Minimize the effect of the Subadditivity effect across your organization?

To defend against the subadditivity effect, organizations must adopt a comprehensive approach to risk assessment and management that emphasizes the interconnectedness of various threats. This can be achieved by implementing structured risk assessment frameworks that require teams to evaluate not only individual risks but also the potential interactions between them. By recognizing that the cumulative risk of multiple events can exceed the sum of their individual probabilities, organizations can foster a culture of vigilance and proactive risk management. Regular training sessions that emphasize the importance of holistic risk evaluation can help ensure that employees at all levels understand the complexities of risk assessment and the potential consequences of underestimating cumulative threats.


Management plays a crucial role in mitigating the effects of the subadditivity effect within operational contexts. By promoting a risk-aware culture, leaders can encourage their teams to approach risk assessment with a mindset that prioritizes thorough analysis over simplification. This involves creating an environment where employees feel empowered to voice concerns about potential vulnerabilities and where cross-functional collaboration is encouraged. Management should also establish clear protocols for evaluating risks associated with new initiatives or changes in operations, ensuring that all potential interactions and compounded risks are considered before decisions are made. This proactive stance can help prevent oversights that may arise from the subadditivity effect.


Moreover, organizations should leverage technology and data analytics to enhance their understanding of risk probabilities. By utilizing sophisticated modeling tools, teams can simulate various scenarios that account for the interactions between multiple threats. This data-driven approach allows organizations to visualize the compounded risks more effectively, thereby facilitating informed decision-making processes. Additionally, conducting regular audits and revisiting risk assessments can help organizations stay ahead of emerging threats and adjust their strategies accordingly, thereby reducing the likelihood of falling victim to cognitive biases such as the subadditivity effect.


Finally, fostering a culture of continuous learning and improvement can significantly contribute to resilience against the cognitive biases that hackers may exploit. Organizations should prioritize ongoing education and training focused on cybersecurity awareness, emphasizing the importance of recognizing the interconnected nature of risks. By helping employees understand that threats often do not exist in isolation, organizations can empower their workforce to take a more proactive stance in identifying vulnerabilities and mitigating risks. This strategic approach not only enhances individual and organizational awareness but also reinforces defenses against potential attacks, ultimately contributing to a more secure operational environment.


Meet The Social Engineer

Joshua Crumbaugh

Joshua Crumbaugh
Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
PosterPosterPoster