20
The Rader Network ® RaderM , 14-15 May 2007, Sli The The Rader Rader Network Network Presentation and Demonstration Presentation and Demonstration to participants of the to participants of the yber Security and Information Infrastructure Research Worksho yber Security and Information Infrastructure Research Worksho 14-15 May 07 14-15 May 07 Joint Institute for Joint Institute for Computational Computational Sciences Sciences Σ Technology Risk Manager

The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

Embed Size (px)

Citation preview

Page 1: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 1

TheTheRaderRaderNetworkNetwork

Presentation and DemonstrationPresentation and Demonstrationto participants of theto participants of the

Cyber Security and Information Infrastructure Research WorkshopCyber Security and Information Infrastructure Research Workshop14-15 May 0714-15 May 07

Joint Institute forJoint Institute for Computational SciencesComputational Sciences

ΣTechnologyRiskManager

Page 2: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 2

IntroductionsIntroductions

Dr. Martin Carmichael

Chief Information Officer, The Rader Network

Mike Rader

President / CEO, The Rader Network

Katie Carmichael

Principal Engineer, Technology Risk Manager

Page 3: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 3

PhilosophyPhilosophy

Quantitative metrics are desirable, and should be attempted in all verification, validation, and accreditation activities

Quantitative metrics in information assurance eliminate ambiguity in computational-experimental comparisons

Prior to TRM, obtaining quantitative metrics in information assurance and defining their associated success criteria was not possible

Page 4: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 4

The Challenge (Narrative View)The Challenge (Narrative View)

National Infrastructure Protection Plan (NIPP)

National Institute of Standards & Technology (NIST)

National Security Agency (NSA)

Security Technical Implementation Guides (STIGs)

Department of Defense (DoD):

DOD Information Assurance Certification and Accreditation

Program (DIACAP)

DoD Information Technology Security Certification and

Accreditation Process (DITSCAP)

Defense Information Systems Agency (DISA)

Defense Information Technology Contracting Office (DITCO)

Defense Modeling and Simulation Office (DMSO)

U.S. Air Force (USAF)

Health Insurance Portability and Accountability Act of 1996

Public Key Infrastructure

Prior to TRM,

not possible in

information assurance

Non-Parametric Parametric

Page 5: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 5

The Challenge (Scientific View)The Challenge (Scientific View)

Infe

rent

ial s

tatis

tical

max

imum

Inferential statistical minimum

+

+

+

+

+

+

+

+

+

++

+

+

+

Known outcome space

Possible outcome space is infinite

Page 6: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 6

The Challenge (Mathematical View)The Challenge (Mathematical View)A

ttrib

ute

(e.g

. Com

plex

ity)

Attr

ibut

e (e

.g. C

ompl

exity

)Ordinal Counts / Levels Risk Continuum

(Virtual / Physical / Administrative)

Functio

n (i.e

., Hal

stea

d)

f (x)

Inst

anti

atio

n

+

Th

reat

Lev

el

+

Example of only 1 of 22 interactive formula

Page 7: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 7

The Challenge (TRM View)The Challenge (TRM View)

Non-parametric risk data Parametric risk data

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

Variable ###

TRM©

ProprietaryDatabase

AcceptedBusinessandAcademiaTheorems

Theorem E

Theorem F

Theorem G

Theorem H

Theorem I

Theorem J

Theorem D

Theorem C

Theorem B

Theorem A

TRM© is aComputer SecurityObjects Register

(CSOR)Registered Algorithm

Maximum

Minimum

Result(“weighted

factor”)

Only TRM© can convert non-parametric values to parametric values

Page 8: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 8

TRM – Calculating MetricsTRM – Calculating Metrics

Each process on the network is evaluated for its security characteristics

Adjacencies are measured and the results are aggregated to determine each host’s security characteristics

Adjacencies are measured a second time and the host calculations are aggregated to calculate the Risk Indices

Page 9: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 9

DefinitionsDefinitions

Not all numbers qualify as metrics. True metrics are numerical facts based on statistical analyses:

Objective: the number is based strictly on mathematical risk characteristics

Quantitative: the number represents the only true statistical knowledge

Repeatable: mathematical or scientific facts must always be repeatable

Defensible: statistical analysis is a long-established and highly respected science

Page 10: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 10

Definitions (continued)Definitions (continued)

TRM Metrics are predictive:

TRM metrics predict the likelihood of a future security failure along each of the Four Dimensions of Risk

Other “metrics” consist of counts -- patches to upload, vulnerabilities noted, past security compromises, etc

Page 11: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 11

Definitions (continued)Definitions (continued)

The Four Dimensions of Risk

Confidentiality: measures how well an organization can authenticate and authorize its users

Integrity: shows how reliable the systems of an organization are in keeping information accurate

Availability: measures how likely an authorized individual is to be able to access appropriate information

Audit: shows how effectively an organization can determine which individuals accessed what data while on their systems

Page 12: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 12

Definitions (continued)Definitions (continued)

TRM Risk Indices describe the likelihood of failure (as a percentage) along the specified dimension given three months and a hacker of average abilities

High Numbers are Bad

Page 13: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 13

EmphasisEmphasis

TRM Return on Investment – TRM’s metrics enable straightforward ROI calculations

Page 14: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 14

Emphasis (continued)Emphasis (continued)

TRM’s Consistency and Variance -- reducing the Risk Index is not the whole story. There needs to be consistency across the network.

Page 15: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 15

TRM – MaturityTRM – Maturity

50 years

Business Practices

Risk Indices (NIST)

External Source Data

Internal Source Data

Doctorial Peer Review Panel

Customers

Version Release

Current

Classification Guides

Service Regulations

DoD Directives

Executive Orders

Continuous

Development

Past Performance (40+ Commercial Customers)

Plans

Procedures

Policies

Processes

Inferential Analyses

TRM©

Software

19 years of research- - - - -

11 years of developmentAcademia Experience

Page 16: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 16

ParametersHarris (STAT)

eEye

(Retina)

IBM

(ISS)TRM

Metrics and Risk Analysis X X X ▲

C I A A X X X ▲

Quantitative, Objective, & Repeatable X X X ▲

Engineering Principles Based X X X ▲

Adjacencies X X X ▲

Baselines X X X ▲

Modeling and Simulations X X X ▲

Trend Analysis X X X ▲

Administrative Rights Required Yes Yes Yes No

TRM – Product ComparisonsTRM – Product Comparisons

Page 17: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 17

TRM – The Next Level of SecurityTRM – The Next Level of Security

• “If you can’t measure it, you can’t manage it”Peter Drucker

• TRM enables you to both measure and manage information assurance with unprecedented accuracy

Page 18: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 18

Principal ContactsPrincipal Contacts

Mike RaderMichaelRader@

RaderNetwork.com(719) 930-1183

Katie CarmichaelKatieCarmichael@

RaderNetwork.com(214) 794-9615

Martin CarmichaelMartinCarmichael@

RaderNetwork.com(214) 794-9510

Page 19: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 19

Questions and Answers(Product Demonstration)

Page 20: The Rader Network ® RaderM, 14-15 May 2007, Slide 1 The Rader Network Presentation and Demonstration to participants of the Cyber Security and Information

The Rader Network® RaderM , 14-15 May 2007, Slide 20

TheTheRaderRaderNetworkNetwork

∑TechnologyRiskManager∑TechnologyRiskManager

Thank you

Joint Institute forJoint Institute for Computational SciencesComputational Sciences