home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
HACKING
/
RISKTOOL.TXT
< prev
next >
Wrap
Text File
|
1994-07-17
|
34KB
|
964 lines
RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW
The National Institute of Standards and Technology (NIST) and the
National Computer Security Center (NCSC) have cooperatively
established a Risk Management Research Laboratory located at the NIST
facilities in Gaithersburg, MD.
The primary objective of the laboratory is to conduct research in risk
management techniques and methodologies. As part of this endeavor,
risk management software products will be surveyed to determine their
applicability to different agency environments. A demonstration
capability is also planned. Although official product evaluations
will not be conducted, reports outlining the characteristics and
capabilities of products surveyed will be prepared.
An additional goal of the laboratory is to develop and publish
guidance on currently available risk management methods. We plan to
develop a "standard" test case for use in the laboratory. The test
case will provide a focal point for controlled analysis and
documentation. It is further planned to develop data on computer
security incidents for estimating threat frequencies, vulnerabilities,
losses, direct and indirect impacts, etc.
A longer range goal of the laboratory is to develop and validate a
formal framework for analyzing, developing, and implementing risk
management methods. We will be looking for methods of risk management
which could be economically employed across a broad spectrum of
computer environments and upon which standards could be based. It is
intended that workshops will be organized to evaluate current and
future technology for this purpose.
Technical contributions and comments are welcome from interested
parties from both the public and private sectors. The point of
contact for the laboratory is Irene Gilbert (NIST),
(301) 975-3360.
Application Control Matrix
Methodology. Matrix approach. This methodology presents application
controls, control objectives, and risks in a mate format. The matrix
provides a summary of the security environment which allows the user
and auditor to quickly view where added safeguards are needed. A data
base of controls from which to make selections is included in this
software package.
Hardware Requirements.
- IBM PC or compatible.
- Two diskette drives or one diskette drive and a fixed drive.
Operating System.
- MS-DOS Version 2.0 or later.
Laser Interface~ease of Use.
- Menu-driven.
- Online HELP facility.
Documentation and Training.
- User Manual.
Developer/Vendor. Nander Brown & Co., Reston, VA (202) 653-6646.
Remarks.
Government agencies may obtain copies of this software at no charge.
BDSS (Bayesian Decision Support System).
Methodology. Quantitative/Qualitative. BDSS is programmed to gather
tangible and intangible asset valuation data and to ask questions that
assess potential risks using quantitative data bases provided by the
vendor. The user can include site-specific threat experiences which
the algorithms will process along with the quantitative knowledge
base. Threats, vulnerabilities, asset categories, and selected
safeguards are automatically mapped and cross-mapped to each other.
system ranks threats before and after the implementation of safeguards
so that the representation of comparable exposure to loss may be
examined. The analysis results are typically displayed graphically
with risk curves based on dollar loss values and probability of loss
coordinates. The central algorithms of BDSS are based on Bayes'
Theorem addressing uncertainty and statistical methods. BDSS software
produces a variety of printed reports as well as ASCII files that may
be exported to the user's word processor. The vulnerability analysis
feature of the BDSS application also provides a stand-alone
qualitative presentation of safeguard system weaknesses.
Hardware requirements.
- IBM PC/AT or compatible.
- 640KB memory.
- 20MB fixed drive and one diskette drive.
- Graphics card (CGA/EGA)
Operating System.
- MS-DOS Version 3.0 or later.
User Interface/Ease of Use.
- Menu driven.
Documentation and Training:
- User manual.
- Training is not included with purchase but may be provided
upon request.
Developer/Vendor. Ozier, Perry & Associates developed BDSS in a joint
venture with Pickard, Lowe and Garrick, Inc. of Newport Beach, CA and
Washington, DC. For further information regarding the software contact
Ozier, Perry & Associates, San Francisco, CA; (415) 989-9092
Remarks. BUDDY SYSTEM
Methodology. Qualitative. The Buddy System is an automated risk
analysis methodology for microcomputer environments and comprises two
components: (1) countermeasures survey and (2) security analysis and
management (SAM). This software package assesses the level of
vulnerability based on safeguards already in place. The level of
information being processed on the system determines whether or not
the assessed level of vulnerability is acceptable. Recommendations for
corrective action are provided for each vulnerability that falls
outside of the acceptable range through the use of on-line "what if'
scenarios. A data base containing over 100 safeguards is included in
this software package. Further, the Risk Management component of the
system allows the analyst to track recommended corrective action
implementations for reports and/or follow-up procedures.
Hardware Requirements.
- IBM PC or compatible.
- 256KB memory.
- 10MB fixed drive and one 360K diskette drive.
Operating system.
- MS-DOS Version 2.0 or later.
User Interface/Ease of Use.
- On-line HELP facility.
Documentation and Training.
- User manual.
- One-day on-site training course.
- Training component built into the software to increase security
awareness.
Developer/Vendor: Countermeasures, Inc., Hollywood, MD; (301) 373-
5166.
Remarks.
- Optional Maintenance Utility allows the user to customize the
software.
- Report and screen formats can be edited with standard DOS
editor.
CONTROL MATRIX METHODOLOGY FOR MICROCOMPUTERS
Methodology. Matrix approach. This software provides a matrix
approach for designing controls into microcomputer system
environments. It identifies which controls are necessary to ensure
adequate security in business or scientific systems. The software
package contains four separate systems.
Package 1 (Designing Controls into Computerized Systems) is an
educational tool that teaches the user how to design and develop a
control matrix.
Package 2 (Risk Ranking the Matrix) teaches the use of Delphi and
Comparison Risk Ranking techniques to rank threats and their controls.
Package 3 (Automated PC-Based Control Matrix Design) is a control
matrix development package that contains a database of controls plus
separate databases of threats and computer system components. This
package allows one to draw a draft matrix, search the controls
database and move relevant controls to a matrix controls list.
Package 4 (Show Text Presentation Graphics) is used to draw the final
matrix resequencing threats, components, and controls.
Hardware Requirements.
- IBM PC or compatible or IBM Personal System/2.
- 384KB memory.
- Two diskette drives or 10MB fixed disk.
- Graphics capability.
Operating system.
- MS-DOS Version 2.0 or later.
User Interface/Ease of Use.
- A demo diskette provides a ten minute introduction to the
matrix concept of designing controls into computerized systems.
Documentation and Training.
- User manual.
- Automated course.
- One or two day on-site training upon request.
Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA
(415) 591-5676
Remarks.
CRAMM (CCTA Risk Analysis and Management Methodology)
Methodology: Qualitative. CRAMM is a risk analysis tool developed by
the British government and BIS Applied Systems Limited. CRAMM is
composed of three stages, each supported by questionnaires and
guidelines. The primary function of Stage 1 is the valu