964 lines
33 KiB
Plaintext
964 lines
33 KiB
Plaintext
|
RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW
|
|||
|
|
|||
|
|
|||
|
The National Institute of Standards and Technology (NIST) and the
|
|||
|
National Computer Security Center (NCSC) have cooperatively
|
|||
|
established a Risk Management Research Laboratory located at the NIST
|
|||
|
facilities in Gaithersburg, MD.
|
|||
|
|
|||
|
The primary objective of the laboratory is to conduct research in risk
|
|||
|
management techniques and methodologies. As part of this endeavor,
|
|||
|
risk management software products will be surveyed to determine their
|
|||
|
applicability to different agency environments. A demonstration
|
|||
|
capability is also planned. Although official product evaluations
|
|||
|
will not be conducted, reports outlining the characteristics and
|
|||
|
capabilities of products surveyed will be prepared.
|
|||
|
|
|||
|
An additional goal of the laboratory is to develop and publish
|
|||
|
guidance on currently available risk management methods. We plan to
|
|||
|
develop a "standard" test case for use in the laboratory. The test
|
|||
|
case will provide a focal point for controlled analysis and
|
|||
|
documentation. It is further planned to develop data on computer
|
|||
|
security incidents for estimating threat frequencies, vulnerabilities,
|
|||
|
losses, direct and indirect impacts, etc.
|
|||
|
|
|||
|
A longer range goal of the laboratory is to develop and validate a
|
|||
|
formal framework for analyzing, developing, and implementing risk
|
|||
|
management methods. We will be looking for methods of risk management
|
|||
|
which could be economically employed across a broad spectrum of
|
|||
|
computer environments and upon which standards could be based. It is
|
|||
|
intended that workshops will be organized to evaluate current and
|
|||
|
future technology for this purpose.
|
|||
|
|
|||
|
Technical contributions and comments are welcome from interested
|
|||
|
parties from both the public and private sectors. The point of
|
|||
|
contact for the laboratory is Irene Gilbert (NIST),
|
|||
|
(301) 975-3360.
|
|||
|
Application Control Matrix
|
|||
|
|
|||
|
Methodology. Matrix approach. This methodology presents application
|
|||
|
controls, control objectives, and risks in a mate format. The matrix
|
|||
|
provides a summary of the security environment which allows the user
|
|||
|
and auditor to quickly view where added safeguards are needed. A data
|
|||
|
base of controls from which to make selections is included in this
|
|||
|
software package.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- Two diskette drives or one diskette drive and a fixed drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
Laser Interface~ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- Online HELP facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User Manual.
|
|||
|
|
|||
|
Developer/Vendor. Nander Brown & Co., Reston, VA (202) 653-6646.
|
|||
|
Remarks.
|
|||
|
Government agencies may obtain copies of this software at no charge.
|
|||
|
BDSS (Bayesian Decision Support System).
|
|||
|
Methodology. Quantitative/Qualitative. BDSS is programmed to gather
|
|||
|
tangible and intangible asset valuation data and to ask questions that
|
|||
|
assess potential risks using quantitative data bases provided by the
|
|||
|
vendor. The user can include site-specific threat experiences which
|
|||
|
the algorithms will process along with the quantitative knowledge
|
|||
|
base. Threats, vulnerabilities, asset categories, and selected
|
|||
|
safeguards are automatically mapped and cross-mapped to each other.
|
|||
|
system ranks threats before and after the implementation of safeguards
|
|||
|
so that the representation of comparable exposure to loss may be
|
|||
|
examined. The analysis results are typically displayed graphically
|
|||
|
with risk curves based on dollar loss values and probability of loss
|
|||
|
coordinates. The central algorithms of BDSS are based on Bayes'
|
|||
|
Theorem addressing uncertainty and statistical methods. BDSS software
|
|||
|
produces a variety of printed reports as well as ASCII files that may
|
|||
|
be exported to the user's word processor. The vulnerability analysis
|
|||
|
feature of the BDSS application also provides a stand-alone
|
|||
|
qualitative presentation of safeguard system weaknesses.
|
|||
|
|
|||
|
Hardware requirements.
|
|||
|
|
|||
|
- IBM PC/AT or compatible.
|
|||
|
- 640KB memory.
|
|||
|
- 20MB fixed drive and one diskette drive.
|
|||
|
- Graphics card (CGA/EGA)
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 3.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu driven.
|
|||
|
|
|||
|
Documentation and Training:
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training is not included with purchase but may be provided
|
|||
|
upon request.
|
|||
|
|
|||
|
Developer/Vendor. Ozier, Perry & Associates developed BDSS in a joint
|
|||
|
venture with Pickard, Lowe and Garrick, Inc. of Newport Beach, CA and
|
|||
|
Washington, DC. For further information regarding the software contact
|
|||
|
Ozier, Perry & Associates, San Francisco, CA; (415) 989-9092
|
|||
|
|
|||
|
Remarks. BUDDY SYSTEM
|
|||
|
|
|||
|
Methodology. Qualitative. The Buddy System is an automated risk
|
|||
|
analysis methodology for microcomputer environments and comprises two
|
|||
|
components: (1) countermeasures survey and (2) security analysis and
|
|||
|
management (SAM). This software package assesses the level of
|
|||
|
vulnerability based on safeguards already in place. The level of
|
|||
|
information being processed on the system determines whether or not
|
|||
|
the assessed level of vulnerability is acceptable. Recommendations for
|
|||
|
corrective action are provided for each vulnerability that falls
|
|||
|
outside of the acceptable range through the use of on-line "what if'
|
|||
|
scenarios. A data base containing over 100 safeguards is included in
|
|||
|
this software package. Further, the Risk Management component of the
|
|||
|
system allows the analyst to track recommended corrective action
|
|||
|
implementations for reports and/or follow-up procedures.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 256KB memory.
|
|||
|
- 10MB fixed drive and one 360K diskette drive.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- On-line HELP facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- One-day on-site training course.
|
|||
|
- Training component built into the software to increase security
|
|||
|
awareness.
|
|||
|
|
|||
|
Developer/Vendor: Countermeasures, Inc., Hollywood, MD; (301) 373-
|
|||
|
5166.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
- Optional Maintenance Utility allows the user to customize the
|
|||
|
software.
|
|||
|
- Report and screen formats can be edited with standard DOS
|
|||
|
editor.
|
|||
|
CONTROL MATRIX METHODOLOGY FOR MICROCOMPUTERS
|
|||
|
|
|||
|
Methodology. Matrix approach. This software provides a matrix
|
|||
|
approach for designing controls into microcomputer system
|
|||
|
environments. It identifies which controls are necessary to ensure
|
|||
|
adequate security in business or scientific systems. The software
|
|||
|
package contains four separate systems.
|
|||
|
|
|||
|
Package 1 (Designing Controls into Computerized Systems) is an
|
|||
|
educational tool that teaches the user how to design and develop a
|
|||
|
control matrix.
|
|||
|
|
|||
|
Package 2 (Risk Ranking the Matrix) teaches the use of Delphi and
|
|||
|
Comparison Risk Ranking techniques to rank threats and their controls.
|
|||
|
|
|||
|
Package 3 (Automated PC-Based Control Matrix Design) is a control
|
|||
|
matrix development package that contains a database of controls plus
|
|||
|
separate databases of threats and computer system components. This
|
|||
|
package allows one to draw a draft matrix, search the controls
|
|||
|
database and move relevant controls to a matrix controls list.
|
|||
|
|
|||
|
Package 4 (Show Text Presentation Graphics) is used to draw the final
|
|||
|
matrix resequencing threats, components, and controls.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible or IBM Personal System/2.
|
|||
|
- 384KB memory.
|
|||
|
- Two diskette drives or 10MB fixed disk.
|
|||
|
- Graphics capability.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- A demo diskette provides a ten minute introduction to the
|
|||
|
matrix concept of designing controls into computerized systems.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Automated course.
|
|||
|
- One or two day on-site training upon request.
|
|||
|
|
|||
|
Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA
|
|||
|
(415) 591-5676
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
CRAMM (CCTA Risk Analysis and Management Methodology)
|
|||
|
|
|||
|
Methodology: Qualitative. CRAMM is a risk analysis tool developed by
|
|||
|
the British government and BIS Applied Systems Limited. CRAMM is
|
|||
|
composed of three stages, each supported by questionnaires and
|
|||
|
guidelines. The primary function of Stage 1 is the valuation of data
|
|||
|
and physical assets of the system or network under review. Qualitative
|
|||
|
values are determined for the data assets on a scale of 1 to 10, for
|
|||
|
potential impacts of disclosure, modification, destruction, and
|
|||
|
availability. The physical asset are valued on the basis of
|
|||
|
replacement costs, which are also convened to scalar values of 1 to
|
|||
|
10, with 10 representing the highest value. The review moves to stage
|
|||
|
2 for those assets valued higher than 3. (Baseline protective measures
|
|||
|
are recommended for assets valued lower than 3).
|
|||
|
|
|||
|
Stage 2 measures the levels of threats and vulnerabilities for each
|
|||
|
asset group and then measures the risks on a scale of 1 to 5. In stage
|
|||
|
3, these measures are used to select safeguards from a library of over
|
|||
|
900. CRAMM provides an iterative safeguard evaluation, in priority
|
|||
|
sequence, to facilitate selection of the most appropriate safeguards.
|
|||
|
A variety of reports are produced. CRAMM also provides a password
|
|||
|
logon function. Sensitivity markings are provided on all screens and
|
|||
|
hardcopy output.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 640KB memory.
|
|||
|
- 10MB fixed drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS 2.1 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- On-line HELP facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Management guide.
|
|||
|
- Training available upon request.
|
|||
|
|
|||
|
Developer/Vendor. BIS Applied Systems Limited, London SE1 9PN,
|
|||
|
England; telephone 011-44-1-633-0866.
|
|||
|
|
|||
|
Remarks. CRAMM is available in the USA by licence agreement between
|
|||
|
BIS and the UK Central Computer Telecommunications Agency. The BIS
|
|||
|
Service Representative and provider of a US-based help desk and
|
|||
|
support services is Executive Resources Associates, Inc., Suite 813,
|
|||
|
One Crystal Drive, Arlington, VA 22202; (703) 920-5200.CRITI-CALC
|
|||
|
|
|||
|
Methodology: Quantitative/Qualitative. This product uses the concept
|
|||
|
of annualized loss expectancy (ALE) to quantify the criticality of
|
|||
|
risk exposure for applications. The software collects information
|
|||
|
about each application's loss potential, optimum off-site recovery,
|
|||
|
cost of backup, cost 10 recover. It uses this information to
|
|||
|
calculate each application's annualized risk potential. The
|
|||
|
criticality of each application is determined by the potential for
|
|||
|
loss caused by a processing interruption and a profile of up to 14
|
|||
|
delay factors. The user interacts with the system by means of screens
|
|||
|
which display information about the risk exposure. Once the user has
|
|||
|
reviewed the initial results, "what if" analysis may be performed by
|
|||
|
modifying the input data as a way of verifying the effectiveness of
|
|||
|
certain safeguards. The information contained in the output reports
|
|||
|
may be used to optimize contingency plans. The ALE, as a function of
|
|||
|
maximum outage duration, is compared with the corresponding cost of
|
|||
|
backup data to identify automatically the optimum off-site recovery
|
|||
|
site.
|
|||
|
|
|||
|
Hardware requirements:
|
|||
|
|
|||
|
- IBM PC/XT or compatible.
|
|||
|
- 64OK memory.
|
|||
|
- 360K diskette drive.
|
|||
|
- Feed drive not necessary but convenient.
|
|||
|
|
|||
|
Operating SYstem:
|
|||
|
|
|||
|
- MS-DOS Version 2.11 or later.
|
|||
|
|
|||
|
User Interface ease of Use:
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- Help screen.
|
|||
|
|
|||
|
Documentation and Training:
|
|||
|
|
|||
|
- User manual with sample databases and detailed tutorial.
|
|||
|
- On-site training.
|
|||
|
|
|||
|
Developer/Vendor: International Security Technology, Reston, VA (703)
|
|||
|
471-0885.
|
|||
|
|
|||
|
Remarks.
|
|||
|
GRA/SYS
|
|||
|
|
|||
|
Methodology. Qualitative. GRA/SYS is a tool designed to assist
|
|||
|
internal auditors and security personnel in developing a work priority
|
|||
|
plan for reviewing organizational risks. Specifically, the software
|
|||
|
prepares an applications and computer activity inventory, determines
|
|||
|
the number of risks for several major control areas. A risk score that
|
|||
|
reflects the measure of risk to the organization is calculated and
|
|||
|
placed in descending order on a scale of 1 to 9, with 9 representing a
|
|||
|
worst-case situation. An additional report that reflects the number
|
|||
|
of times each risk occurs is also prepared. Using the output reports
|
|||
|
from this software package, the user is able to identify those risks
|
|||
|
where more effective safeguards are needed.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 64KB memory.
|
|||
|
- One diskette drive.
|
|||
|
|
|||
|
Software Requirements.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training is not offered with the purchase.
|
|||
|
|
|||
|
|
|||
|
Developer/Vendor. Nander Brown & Co., Reston, VA.;
|
|||
|
(202) 653-6646.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
Government organizations may obtain this software at no cost.
|
|||
|
IST/RAMP (International Security Technology/Risk Analysis
|
|||
|
Management Program)
|
|||
|
|
|||
|
Methodology. Quantitative and Qualitative. 1ST/RAMP is a mainframe-
|
|||
|
resident risk analysis program with an input module that is PC-
|
|||
|
resident. The software calculates the annualized loss expectancy and
|
|||
|
as well as single occurrence loss. The system can also provide a
|
|||
|
qualitative analysis. 1ST/RAMP generates data collection forms to
|
|||
|
assist the risk analyst in organizing and controlling data collection.
|
|||
|
Five loss categories are addressed: service interruptions; physical
|
|||
|
loss and damage; fraud; unauthorized disclosure; and physical theft. A
|
|||
|
library of data bases enables the analyst to maintain an audit trail
|
|||
|
of input data changes. A 'what-if' capability enables the analyst to
|
|||
|
select the most cost-effective security measures.
|
|||
|
|
|||
|
RAMP<->LINK~is a PC-resident, menu-driven data entry system which uses
|
|||
|
risk information entered by the analyst to build a DOS file that can
|
|||
|
be uploaded to IST/RAMP for processing.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM Mainframe for IST/RAMP--30xx with MVS.
|
|||
|
- Interactive under TSO and Roscoe.
|
|||
|
- IBM PC/XT or compatible for RAMP<->Link.
|
|||
|
- 5K12 memory.
|
|||
|
- Two diskette drives or one diskette and fixed disk drives.
|
|||
|
|
|||
|
Software Requirements.
|
|||
|
|
|||
|
- MS DOS Version 2.1 or later.
|
|||
|
|
|||
|
User Interface/lEase of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- Training manual with sample data bases and detailed tutorial.
|
|||
|
- User manual.
|
|||
|
- Three-day on-site training.
|
|||
|
- Pocket reference.
|
|||
|
|
|||
|
Developer/Vendor International Security Technology, Reston, VA; (703)
|
|||
|
471-0885.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
RAMP<->L~ makes it unnecessary for the analyst to be familiar with the
|
|||
|
details of 1ST/RAMP data entry formats. The analyst enters the data
|
|||
|
off-line and logs onto a mainframe where 1ST/RAMP is resident using
|
|||
|
any communications software package that has a "file send" command.
|
|||
|
JANBER
|
|||
|
|
|||
|
Methodology: Qualitative. Janber initiates a yes/no questionnaire
|
|||
|
and checklIst for collecting information about security controls
|
|||
|
already in place. The software weights safeguards currently in place
|
|||
|
and measures them against the level of data being processed on the
|
|||
|
system. These data classification levels point to highly sensitive but
|
|||
|
unclassified information to highly classified data. The analysis
|
|||
|
provides a linguistic characterization of the level of vulnerability
|
|||
|
from 2-28, with 28 representing a worst-case scenario.
|
|||
|
Vulnerabilities, safeguards and their weights can be preestablished by
|
|||
|
the vendor to meet the organization requirements. Safeguards that are
|
|||
|
required but not implemented are flagged in a report and
|
|||
|
recommendations for safeguards that meet organizational guidelines and
|
|||
|
directives are provided. Users have the capability of performing
|
|||
|
"what-if' scenarios to evaluate the effectiveness of certain
|
|||
|
safeguards.
|
|||
|
|
|||
|
The Janber application allows users to define standard entries for
|
|||
|
specific data fields. The results of the data collection and analysis
|
|||
|
are maintained on separate data bases. The developer recommends that
|
|||
|
both the analysis and the data collection be performed by different
|
|||
|
personnel to assure the integrity of the results. The developer
|
|||
|
further recommends that the analysis be performed by computer security
|
|||
|
professionals to achieve optimum results. The software provides a
|
|||
|
capability to track action items resulting from the evaluation.
|
|||
|
|
|||
|
Janber creates a database of information on all systems surveyed and
|
|||
|
provides a data base query capability for contingency planning and
|
|||
|
recovery operations.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 10MB Feed drive and one diskette drive.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or higher.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- On-line help facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training provided upon request.
|
|||
|
|
|||
|
Developer/Vendor. Eagan, McAIlister Associates, Inc., Lexington Park,
|
|||
|
MD 20653; (301) 862-3565.
|
|||
|
|
|||
|
Remarks.LAVA (Los Alamos Vulnerability and Risk Assessment)
|
|||
|
|
|||
|
Methodology: Qualitative and Quantitative. LAVA administers
|
|||
|
questionnaires which results in the identification of missing
|
|||
|
safeguards in 34 areas ranging from password management to personnel
|
|||
|
security and internal audit practices. The software evaluates
|
|||
|
potential consequences and impact upon the organization and the
|
|||
|
ultimate loss exposure (risks). LAVA considers three kinds of threats:
|
|||
|
natural and environmental hazards; accidental and intentional on-site
|
|||
|
human threats (including the authorized insider); and off-site human
|
|||
|
threats. Detailed LAVA reports provide both qualitative and
|
|||
|
quantitative results of the risks identified.
|
|||
|
|
|||
|
Hardware requirements.
|
|||
|
|
|||
|
- IBM PC- or compatible.
|
|||
|
- 512KB memory.
|
|||
|
- 360KB and 720KB diskette drives; or 1.2MB fixed drive and
|
|||
|
one 360~ diskette drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Interactive questionnaires.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- On-site training.
|
|||
|
- Demonstration diskette.
|
|||
|
|
|||
|
Developer/Vendor. Los AIamos National Laboratory, Los AIamos, NM;
|
|||
|
(505) 667-7777.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
The LAVA methodology stresses a team approach for conducting the risk
|
|||
|
assessment. It is recommended the team be composed of people with a
|
|||
|
broad spectrum of backgrounds and expertise to ensure a thorough
|
|||
|
assessment. It is further recommended that a consensus among the group
|
|||
|
be reached before entering an answer to any of the questions, and that
|
|||
|
in some cases this may be the most difficult part of administering
|
|||
|
this risk management software.
|
|||
|
|
|||
|
Distribution of this package is handled through the National Security
|
|||
|
Agency (contacts include Sam Samuelson (301)~688-6022; Ed Markel (301)
|
|||
|
688-6022; or John LaPaille (301) 688-5331.
|
|||
|
LRAM (Livermore Risk Analysis Methodology)
|
|||
|
|
|||
|
Methodology: Quantitative. A government-developed system, this
|
|||
|
methodology is structured to allow screening of asset/threat-event
|
|||
|
combinations so that only high impact risks are reviewed. The
|
|||
|
methodology focuses attention on the effectiveness of proposed
|
|||
|
security controls as well as those already in place. LRAM is divided
|
|||
|
into three major phases to include project planning, risk analysis,
|
|||
|
and decision support. The initial phase defines the scope of the
|
|||
|
analysis and identifies needed resources and personnel. The second
|
|||
|
phase analyzes the data collected from phase 1. In this second phase,
|
|||
|
risk elements are identified by establishing corresponding threats,
|
|||
|
control and asset components, the results of which are provided as
|
|||
|
input for the final decision support phase.
|
|||
|
|
|||
|
The final decision support phase is meant to assist in the security
|
|||
|
management of information. It is a process to select and list in
|
|||
|
priority order each recommended safeguard on the basis of cost benefit
|
|||
|
estimates and other decision indexes.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 640K memory.
|
|||
|
- One diskette drive and fixed drive.
|
|||
|
|
|||
|
Operating SYstem.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
|
|||
|
|
|||
|
Developer/Vendor~ Lawrence Livermore National Laboratory, Livermore,
|
|||
|
CA; (415) 423-3083 or 543-3082.
|
|||
|
|
|||
|
Remarks.
|
|||
|
MARION
|
|||
|
|
|||
|
Methodology. Qualitative/Quantitative. LION assesses business risks
|
|||
|
associated with information systems drawing on a large database of
|
|||
|
actual incidents. The software incorporates a questionnaire to
|
|||
|
evaluate the level of security that is currently being applied within
|
|||
|
the organization. Each question is allocated a weighting which
|
|||
|
reflects the relative importance according to the analysis of the
|
|||
|
underlying database of events. A score is allocated for each question;
|
|||
|
the responses and scores are stored. The software calculates the
|
|||
|
overall score for 27 categories of security and presents the results
|
|||
|
graphically and in printed form. Once the current security profile
|
|||
|
has been determined, MARION compares each category with industry norms
|
|||
|
which are derived from the database. The software uses the information
|
|||
|
on costs also held iii the database to calculate an estimated
|
|||
|
expenditure in relation to the total security budget. The calculated
|
|||
|
costs are analyzed according to the nature of the security category
|
|||
|
and presented graphically in detailed tables. A "what-if" capability
|
|||
|
allows one to use different budgets to determine the effects on the
|
|||
|
security profile. The effects of the proposed measures can also be
|
|||
|
displayed.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 5l2K memory.
|
|||
|
- Graphics capability.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS DOS 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User Manual.
|
|||
|
|
|||
|
Developer/Vendor. Coopers & Lybrand (United Kingdom firm), Plumtree
|
|||
|
Court, London EC4A 4HT, telephone 01-822-4678.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
MARION is a methodology developed in France. Coopers & Lybrand are the
|
|||
|
agents for the package in the UK. They have worked with a French
|
|||
|
software house PSI to produce an English version of the package and
|
|||
|
supporting reference material.
|
|||
|
|
|||
|
MicroSecure Self Assessment
|
|||
|
|
|||
|
Methodology. Qualitative. An automated software tool that will allow
|
|||
|
PC users to conduct a security self-assessment. The software analyzes
|
|||
|
the PC environment, determines the vulnerabilities, and recommends
|
|||
|
security controls. Those safeguards recommended are designed to
|
|||
|
increase security and reduce exposures in six areas to include system
|
|||
|
integrity, data security, credibility, data integrity, backup and
|
|||
|
disaster recovery, and confidentiality and privacy. The software may
|
|||
|
be customized to meet specific requirements.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 256K memory.
|
|||
|
- One diskette drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS DOS 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User Guide.
|
|||
|
- On-line tutorial.
|
|||
|
|
|||
|
Developer/Vendor Boden Associates, East Williston, NY;
|
|||
|
(516) 294-2648.
|
|||
|
|
|||
|
Remarks. An optional question quiz is provided at the end of each
|
|||
|
chapter of the training course. Recommendations for corrective action
|
|||
|
can be printed directly to the printer or written to an ASCII text
|
|||
|
file for editing.
|
|||
|
MINIRISK
|
|||
|
|
|||
|
Methodology. Qualitative. MINIRISK is a tool designed to assess
|
|||
|
computer security vulnerabilities in a micro computer environment. A
|
|||
|
vulnerability assessment questionnaire allows the organization to
|
|||
|
evaluate the adequacy and completeness of individual safeguards areas
|
|||
|
and to reevaluate these same areas after missing safeguards have been
|
|||
|
implemented. During the process of answering the MINIRlSK
|
|||
|
questionnaire, the user identifies missing safeguards in 10 to 50
|
|||
|
vulnerability categories ranging from password management to
|
|||
|
contingency planning and internal audit controls. Safeguards and
|
|||
|
controls considered mandatory by the organization have been appointed
|
|||
|
for each category that is to be reviewed. The absence of certain
|
|||
|
safeguards determines the level of vulnerability on a scale of zero to
|
|||
|
9, with zero being the best case, and 9 the worst. MINIRISK
|
|||
|
establishes a threshold by which to evaluate vulnerabilities that
|
|||
|
exceed an acceptable risk level.
|
|||
|
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 64KB memory.
|
|||
|
- One diskette drive.
|
|||
|
|
|||
|
Software Requirements.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- Online HELP facility.
|
|||
|
- User defined questionnaire.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training is not offered with the purchase.
|
|||
|
|
|||
|
Developer/Vendor. Nander Brown & Co., Reston, VA.; (703) 689-4580.
|
|||
|
|
|||
|
Remarks. Government organizations may obtain this software at no
|
|||
|
cost.
|
|||
|
PRISM Risk Analysis and Simulation for the PC
|
|||
|
|
|||
|
Methodology. Qualitative. Prism supports development of risk analysis
|
|||
|
modelling, simulation, sensitivity analysis, and graphical
|
|||
|
presentation of results. It also contains system functions to save,
|
|||
|
retrieve, display, and modify existing models. In addition to simple
|
|||
|
algebraic equations, Prism permits use of BASIC-like statements to
|
|||
|
model more complex applications.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 512K fixed drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS 2.0 or later.
|
|||
|
|
|||
|
User Interface/lEase of Use.
|
|||
|
|
|||
|
- On-line HELP facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training and on-site seminars.
|
|||
|
- Consulting services available to assist in model development.
|
|||
|
|
|||
|
Developer/Vendor. Palisade Corporation, Newfield, NY;
|
|||
|
(607) 564-9993.
|
|||
|
|
|||
|
Remarks.
|
|||
|
QUICKRISK
|
|||
|
|
|||
|
Methodology: Qualitative. Quikrisk requires the user to input
|
|||
|
information about the systems and facilities on a scenario form. These
|
|||
|
forms pertain to potential threats, current safeguards, and assets.
|
|||
|
Once all of the input information has been entered, the software
|
|||
|
computes the results which provide an annual loss exposure. An
|
|||
|
additional computation is performed which displays a return on
|
|||
|
investment for each control in place. The analyst also has the
|
|||
|
capability of modifying the results of previous computations by
|
|||
|
modifying the input data. In addition, the software is delivered with
|
|||
|
a threat file containing numerous threats and frequencies. The user
|
|||
|
has the capability of adding threats to this list.
|
|||
|
|
|||
|
|
|||
|
Hardware requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- Two diskette drives.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface~se of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
|
|||
|
Developer/Vendor Basic Data Systems, Rockville, MD;
|
|||
|
(301) 269-2691.
|
|||
|
|
|||
|
Remarks.
|
|||
|
RANK-IT
|
|||
|
Methodology. RANK-IT is a risk assessment software package that uses
|
|||
|
the Delphi technique. Delphi is an expert system approach to risk
|
|||
|
ranking. This software automates the Delphi technique by adding
|
|||
|
Comparison Risk Ranking to obtain an ordinally ranked list of the
|
|||
|
items being ranked or to calculate percentage risk values. Each
|
|||
|
ranked item has a numerical value that can be used as a weighting
|
|||
|
factor or a cardinal number value.
|
|||
|
|
|||
|
RANK-IT is used to risk rank system threats, controls,
|
|||
|
vulnerabilities, components, or any other criteria. It also can be
|
|||
|
used to rank other types of business decision alternatives, whether
|
|||
|
quantifiable or not.
|
|||
|
|
|||
|
The developer suggests that the time required to conduct a risk
|
|||
|
ranking using this combined Delphi and Comparison Risk Ranking
|
|||
|
methodology can range from 30 minutes to three hours.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC/XT/AT or compatible or IBM Personal System/2.
|
|||
|
- 5l2KB memory.
|
|||
|
- Single diskette drive or fixed disk (300K memory required).
|
|||
|
- Graphics capability.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- Demonstration diskette.
|
|||
|
- User manual.
|
|||
|
- Tutorial and training diskettes.
|
|||
|
- One-day on-site training upon request.
|
|||
|
|
|||
|
Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA;
|
|||
|
(415) 591-5676.
|
|||
|
|
|||
|
Remarks.
|
|||
|
Risk Analysis System (RA/SYS)
|
|||
|
|
|||
|
Methodology. Quantitative. RA/SYS is an automated risk analysis
|
|||
|
system which processes with a series of interconnected files that can
|
|||
|
assess up to 50 vulnerabilities and assets and 65 threats.
|
|||
|
Calculations are performed on threat/vulnerability pairs to produce
|
|||
|
threat ratings and threat frequencies. A report summarizes loss
|
|||
|
estimates, cost benefit analysis, and return on investment.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 128KB of memory.
|
|||
|
- Two 360KB diskette drives or 640KB fixed drive.
|
|||
|
|
|||
|
Operating System.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
- On-line HELP facility.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Technical assistance available upon request.
|
|||
|
|
|||
|
Developer/Vendor Nander Brown & Co., Reston, VA;
|
|||
|
(202) 689-4580.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
Government agencies may obtain copies of this software at no charge.
|
|||
|
RiskCALC
|
|||
|
|
|||
|
Methodology. Quantitative or Qualitative. An annual loss expectancy
|
|||
|
(ALE) or other metric is computed based on an answered questionnaire.
|
|||
|
The user may optionally change the values of RiskCALC variables to
|
|||
|
determine the most cost-effective safeguards and display the results
|
|||
|
on the user's screen. RiskCALC is part of a 'family' of software tools
|
|||
|
described below. They each provide a standard ASClI file interface for
|
|||
|
exporting and importing RiskCALC variables.
|
|||
|
|
|||
|
o RiskCALC allows the user to answer questions and print
|
|||
|
reports into which values elicited from the questionnaire are
|
|||
|
automatically inserted.
|
|||
|
|
|||
|
o Risk Minimizer identifies an organization's most
|
|||
|
significant risks from a completed analysis. Risk Minimizer may be
|
|||
|
used with other risk management software tools that use the RiskCalc
|
|||
|
file format.
|
|||
|
|
|||
|
0 The System Manager assists in designing or customizing an
|
|||
|
existing risk analysis model.
|
|||
|
|
|||
|
o The Demonstration Models allow the user to develop a
|
|||
|
site-speciiic questionnaire or select one that models several risk
|
|||
|
scenarios.
|
|||
|
|
|||
|
Hardware requirements.
|
|||
|
|
|||
|
- IBM PC or compatible.
|
|||
|
- 5I2KB memory.
|
|||
|
- Fixed drive is optional but recommended.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
MS-DOS Version 2.1 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu driven.
|
|||
|
- On-line help facility.
|
|||
|
- Lotus-like iriterface.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User and system administrator manuals.
|
|||
|
- One day on-site training with purchase.
|
|||
|
- A three-day course on computer security and risk management
|
|||
|
is available upon request.
|
|||
|
|
|||
|
Developer/Vendor. Hoffman Business Associates, Inc., Chevy Chase,
|
|||
|
MD., (301) 656-6205.
|
|||
|
|
|||
|
Remarks
|
|||
|
RISKPAC
|
|||
|
|
|||
|
Methodology. Qualitative. This software product is composed of three
|
|||
|
components--questionnaire, surveys, and reports. The results of the
|
|||
|
questionnaire are stored in a 'survey' which provides the basis of the
|
|||
|
analysis. The questions point to discrete categories that provide a
|
|||
|
review of an organization's policies, physical environment, processing
|
|||
|
hardware and the applications and data which make up a system. Each
|
|||
|
of these categories are evaluated separately. A variety of
|
|||
|
questionnaires that apply to several disciplines (e.g., manufacturing,
|
|||
|
banking, and government) are available. 'Reports' provide the results
|
|||
|
of the evaluation expressed on a scale of one to five, with five
|
|||
|
representing a worst-case scenario. The weighting and scoring
|
|||
|
algorithms are based on Kepner/Tregoe type of analysis. The package
|
|||
|
can produce data files that can be input to various database spread
|
|||
|
sheets. Further, the software is equipped with a number of utility
|
|||
|
routines that allow organizations to develop their own questionnaires.
|
|||
|
This 'System Manager' capability is available separately.
|
|||
|
|
|||
|
Hardware Requirements.
|
|||
|
|
|||
|
- IBM PC, PC/XT, or PC/AT or compatible.
|
|||
|
256K ofmemory.
|
|||
|
- Two diskette drives or 10MB fixed drive.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
- MS-DOS Version 2.0 or later.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training provided upon request.
|
|||
|
|
|||
|
Developer/Vendor: Computer Security Consultants, Ridgefield, CT,
|
|||
|
Subsidiary of Computer Security Consultants, LTD.; (203) 431-8720.
|
|||
|
|
|||
|
Remarks.
|
|||
|
RISKWATCH
|
|||
|
|
|||
|
Methodology. Qualitative/Quantitative. The RISKWATCH software is
|
|||
|
capable of analyzing organizations, facilities, systems, applications
|
|||
|
and networks, both large and small. RiskWatch distinguishes between
|
|||
|
financial, critical, sensitive and classified systems. The system
|
|||
|
access relational data bases that contain over thousands of
|
|||
|
relationships between threats, assets, vulnerabilities, losses, and
|
|||
|
safeguards. Responses to a questionnaire which addresses a wide
|
|||
|
variety of job functions is combined with the databases to produce a
|
|||
|
comprehensive risk analysis report. This report also provides an asset
|
|||
|
inventory, a detailed list of vulnerabilities, threat analysis with
|
|||
|
annual loss expectancies and recommended safeguards that include
|
|||
|
return-on-investment. The system provides a query capability for any
|
|||
|
selected threat, asset, vulnerability or safeguard.
|
|||
|
|
|||
|
Hardware requirements.
|
|||
|
|
|||
|
- IBM-XT/AT or compatible.
|
|||
|
- 640K memory.
|
|||
|
- 10MB fixed drive.
|
|||
|
- Graphics.
|
|||
|
- Color monitor.
|
|||
|
|
|||
|
Operating system.
|
|||
|
|
|||
|
- MS DOS Version 2.1 or higher.
|
|||
|
|
|||
|
User Interface/Ease of Use.
|
|||
|
|
|||
|
- Menu-driven.
|
|||
|
|
|||
|
Documentation and Training.
|
|||
|
|
|||
|
- User manual.
|
|||
|
- Training provided upon request.
|
|||
|
|
|||
|
Developer/Vendor. Expert Systems Software, Inc., Long Beach, CA
|
|||
|
(213) 499-3346.
|
|||
|
|
|||
|
Remarks.
|
|||
|
|
|||
|
The software can be customized to meet the needs of both defense and
|
|||
|
civil organizations. LOGICON is authorized to distribute this
|
|||
|
software package, Arlington, VA (703) 486-3500.
|
|||
|
|
|||
|
|