964 lines
33 KiB
Plaintext
964 lines
33 KiB
Plaintext
RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW
|
||
|
||
|
||
The National Institute of Standards and Technology (NIST) and the
|
||
National Computer Security Center (NCSC) have cooperatively
|
||
established a Risk Management Research Laboratory located at the NIST
|
||
facilities in Gaithersburg, MD.
|
||
|
||
The primary objective of the laboratory is to conduct research in risk
|
||
management techniques and methodologies. As part of this endeavor,
|
||
risk management software products will be surveyed to determine their
|
||
applicability to different agency environments. A demonstration
|
||
capability is also planned. Although official product evaluations
|
||
will not be conducted, reports outlining the characteristics and
|
||
capabilities of products surveyed will be prepared.
|
||
|
||
An additional goal of the laboratory is to develop and publish
|
||
guidance on currently available risk management methods. We plan to
|
||
develop a "standard" test case for use in the laboratory. The test
|
||
case will provide a focal point for controlled analysis and
|
||
documentation. It is further planned to develop data on computer
|
||
security incidents for estimating threat frequencies, vulnerabilities,
|
||
losses, direct and indirect impacts, etc.
|
||
|
||
A longer range goal of the laboratory is to develop and validate a
|
||
formal framework for analyzing, developing, and implementing risk
|
||
management methods. We will be looking for methods of risk management
|
||
which could be economically employed across a broad spectrum of
|
||
computer environments and upon which standards could be based. It is
|
||
intended that workshops will be organized to evaluate current and
|
||
future technology for this purpose.
|
||
|
||
Technical contributions and comments are welcome from interested
|
||
parties from both the public and private sectors. The point of
|
||
contact for the laboratory is Irene Gilbert (NIST),
|
||
(301) 975-3360.
|
||
Application Control Matrix
|
||
|
||
Methodology. Matrix approach. This methodology presents application
|
||
controls, control objectives, and risks in a mate format. The matrix
|
||
provides a summary of the security environment which allows the user
|
||
and auditor to quickly view where added safeguards are needed. A data
|
||
base of controls from which to make selections is included in this
|
||
software package.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- Two diskette drives or one diskette drive and a fixed drive.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
Laser Interface~ease of Use.
|
||
|
||
- Menu-driven.
|
||
- Online HELP facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User Manual.
|
||
|
||
Developer/Vendor. Nander Brown & Co., Reston, VA (202) 653-6646.
|
||
Remarks.
|
||
Government agencies may obtain copies of this software at no charge.
|
||
BDSS (Bayesian Decision Support System).
|
||
Methodology. Quantitative/Qualitative. BDSS is programmed to gather
|
||
tangible and intangible asset valuation data and to ask questions that
|
||
assess potential risks using quantitative data bases provided by the
|
||
vendor. The user can include site-specific threat experiences which
|
||
the algorithms will process along with the quantitative knowledge
|
||
base. Threats, vulnerabilities, asset categories, and selected
|
||
safeguards are automatically mapped and cross-mapped to each other.
|
||
system ranks threats before and after the implementation of safeguards
|
||
so that the representation of comparable exposure to loss may be
|
||
examined. The analysis results are typically displayed graphically
|
||
with risk curves based on dollar loss values and probability of loss
|
||
coordinates. The central algorithms of BDSS are based on Bayes'
|
||
Theorem addressing uncertainty and statistical methods. BDSS software
|
||
produces a variety of printed reports as well as ASCII files that may
|
||
be exported to the user's word processor. The vulnerability analysis
|
||
feature of the BDSS application also provides a stand-alone
|
||
qualitative presentation of safeguard system weaknesses.
|
||
|
||
Hardware requirements.
|
||
|
||
- IBM PC/AT or compatible.
|
||
- 640KB memory.
|
||
- 20MB fixed drive and one diskette drive.
|
||
- Graphics card (CGA/EGA)
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 3.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu driven.
|
||
|
||
Documentation and Training:
|
||
|
||
- User manual.
|
||
- Training is not included with purchase but may be provided
|
||
upon request.
|
||
|
||
Developer/Vendor. Ozier, Perry & Associates developed BDSS in a joint
|
||
venture with Pickard, Lowe and Garrick, Inc. of Newport Beach, CA and
|
||
Washington, DC. For further information regarding the software contact
|
||
Ozier, Perry & Associates, San Francisco, CA; (415) 989-9092
|
||
|
||
Remarks. BUDDY SYSTEM
|
||
|
||
Methodology. Qualitative. The Buddy System is an automated risk
|
||
analysis methodology for microcomputer environments and comprises two
|
||
components: (1) countermeasures survey and (2) security analysis and
|
||
management (SAM). This software package assesses the level of
|
||
vulnerability based on safeguards already in place. The level of
|
||
information being processed on the system determines whether or not
|
||
the assessed level of vulnerability is acceptable. Recommendations for
|
||
corrective action are provided for each vulnerability that falls
|
||
outside of the acceptable range through the use of on-line "what if'
|
||
scenarios. A data base containing over 100 safeguards is included in
|
||
this software package. Further, the Risk Management component of the
|
||
system allows the analyst to track recommended corrective action
|
||
implementations for reports and/or follow-up procedures.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 256KB memory.
|
||
- 10MB fixed drive and one 360K diskette drive.
|
||
|
||
Operating system.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- On-line HELP facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- One-day on-site training course.
|
||
- Training component built into the software to increase security
|
||
awareness.
|
||
|
||
Developer/Vendor: Countermeasures, Inc., Hollywood, MD; (301) 373-
|
||
5166.
|
||
|
||
Remarks.
|
||
|
||
- Optional Maintenance Utility allows the user to customize the
|
||
software.
|
||
- Report and screen formats can be edited with standard DOS
|
||
editor.
|
||
CONTROL MATRIX METHODOLOGY FOR MICROCOMPUTERS
|
||
|
||
Methodology. Matrix approach. This software provides a matrix
|
||
approach for designing controls into microcomputer system
|
||
environments. It identifies which controls are necessary to ensure
|
||
adequate security in business or scientific systems. The software
|
||
package contains four separate systems.
|
||
|
||
Package 1 (Designing Controls into Computerized Systems) is an
|
||
educational tool that teaches the user how to design and develop a
|
||
control matrix.
|
||
|
||
Package 2 (Risk Ranking the Matrix) teaches the use of Delphi and
|
||
Comparison Risk Ranking techniques to rank threats and their controls.
|
||
|
||
Package 3 (Automated PC-Based Control Matrix Design) is a control
|
||
matrix development package that contains a database of controls plus
|
||
separate databases of threats and computer system components. This
|
||
package allows one to draw a draft matrix, search the controls
|
||
database and move relevant controls to a matrix controls list.
|
||
|
||
Package 4 (Show Text Presentation Graphics) is used to draw the final
|
||
matrix resequencing threats, components, and controls.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible or IBM Personal System/2.
|
||
- 384KB memory.
|
||
- Two diskette drives or 10MB fixed disk.
|
||
- Graphics capability.
|
||
|
||
Operating system.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- A demo diskette provides a ten minute introduction to the
|
||
matrix concept of designing controls into computerized systems.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Automated course.
|
||
- One or two day on-site training upon request.
|
||
|
||
Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA
|
||
(415) 591-5676
|
||
|
||
Remarks.
|
||
|
||
CRAMM (CCTA Risk Analysis and Management Methodology)
|
||
|
||
Methodology: Qualitative. CRAMM is a risk analysis tool developed by
|
||
the British government and BIS Applied Systems Limited. CRAMM is
|
||
composed of three stages, each supported by questionnaires and
|
||
guidelines. The primary function of Stage 1 is the valuation of data
|
||
and physical assets of the system or network under review. Qualitative
|
||
values are determined for the data assets on a scale of 1 to 10, for
|
||
potential impacts of disclosure, modification, destruction, and
|
||
availability. The physical asset are valued on the basis of
|
||
replacement costs, which are also convened to scalar values of 1 to
|
||
10, with 10 representing the highest value. The review moves to stage
|
||
2 for those assets valued higher than 3. (Baseline protective measures
|
||
are recommended for assets valued lower than 3).
|
||
|
||
Stage 2 measures the levels of threats and vulnerabilities for each
|
||
asset group and then measures the risks on a scale of 1 to 5. In stage
|
||
3, these measures are used to select safeguards from a library of over
|
||
900. CRAMM provides an iterative safeguard evaluation, in priority
|
||
sequence, to facilitate selection of the most appropriate safeguards.
|
||
A variety of reports are produced. CRAMM also provides a password
|
||
logon function. Sensitivity markings are provided on all screens and
|
||
hardcopy output.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 640KB memory.
|
||
- 10MB fixed drive.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS 2.1 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
- On-line HELP facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Management guide.
|
||
- Training available upon request.
|
||
|
||
Developer/Vendor. BIS Applied Systems Limited, London SE1 9PN,
|
||
England; telephone 011-44-1-633-0866.
|
||
|
||
Remarks. CRAMM is available in the USA by licence agreement between
|
||
BIS and the UK Central Computer Telecommunications Agency. The BIS
|
||
Service Representative and provider of a US-based help desk and
|
||
support services is Executive Resources Associates, Inc., Suite 813,
|
||
One Crystal Drive, Arlington, VA 22202; (703) 920-5200.CRITI-CALC
|
||
|
||
Methodology: Quantitative/Qualitative. This product uses the concept
|
||
of annualized loss expectancy (ALE) to quantify the criticality of
|
||
risk exposure for applications. The software collects information
|
||
about each application's loss potential, optimum off-site recovery,
|
||
cost of backup, cost 10 recover. It uses this information to
|
||
calculate each application's annualized risk potential. The
|
||
criticality of each application is determined by the potential for
|
||
loss caused by a processing interruption and a profile of up to 14
|
||
delay factors. The user interacts with the system by means of screens
|
||
which display information about the risk exposure. Once the user has
|
||
reviewed the initial results, "what if" analysis may be performed by
|
||
modifying the input data as a way of verifying the effectiveness of
|
||
certain safeguards. The information contained in the output reports
|
||
may be used to optimize contingency plans. The ALE, as a function of
|
||
maximum outage duration, is compared with the corresponding cost of
|
||
backup data to identify automatically the optimum off-site recovery
|
||
site.
|
||
|
||
Hardware requirements:
|
||
|
||
- IBM PC/XT or compatible.
|
||
- 64OK memory.
|
||
- 360K diskette drive.
|
||
- Feed drive not necessary but convenient.
|
||
|
||
Operating SYstem:
|
||
|
||
- MS-DOS Version 2.11 or later.
|
||
|
||
User Interface ease of Use:
|
||
|
||
- Menu-driven.
|
||
- Help screen.
|
||
|
||
Documentation and Training:
|
||
|
||
- User manual with sample databases and detailed tutorial.
|
||
- On-site training.
|
||
|
||
Developer/Vendor: International Security Technology, Reston, VA (703)
|
||
471-0885.
|
||
|
||
Remarks.
|
||
GRA/SYS
|
||
|
||
Methodology. Qualitative. GRA/SYS is a tool designed to assist
|
||
internal auditors and security personnel in developing a work priority
|
||
plan for reviewing organizational risks. Specifically, the software
|
||
prepares an applications and computer activity inventory, determines
|
||
the number of risks for several major control areas. A risk score that
|
||
reflects the measure of risk to the organization is calculated and
|
||
placed in descending order on a scale of 1 to 9, with 9 representing a
|
||
worst-case situation. An additional report that reflects the number
|
||
of times each risk occurs is also prepared. Using the output reports
|
||
from this software package, the user is able to identify those risks
|
||
where more effective safeguards are needed.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 64KB memory.
|
||
- One diskette drive.
|
||
|
||
Software Requirements.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training is not offered with the purchase.
|
||
|
||
|
||
Developer/Vendor. Nander Brown & Co., Reston, VA.;
|
||
(202) 653-6646.
|
||
|
||
Remarks.
|
||
|
||
Government organizations may obtain this software at no cost.
|
||
IST/RAMP (International Security Technology/Risk Analysis
|
||
Management Program)
|
||
|
||
Methodology. Quantitative and Qualitative. 1ST/RAMP is a mainframe-
|
||
resident risk analysis program with an input module that is PC-
|
||
resident. The software calculates the annualized loss expectancy and
|
||
as well as single occurrence loss. The system can also provide a
|
||
qualitative analysis. 1ST/RAMP generates data collection forms to
|
||
assist the risk analyst in organizing and controlling data collection.
|
||
Five loss categories are addressed: service interruptions; physical
|
||
loss and damage; fraud; unauthorized disclosure; and physical theft. A
|
||
library of data bases enables the analyst to maintain an audit trail
|
||
of input data changes. A 'what-if' capability enables the analyst to
|
||
select the most cost-effective security measures.
|
||
|
||
RAMP<->LINK~is a PC-resident, menu-driven data entry system which uses
|
||
risk information entered by the analyst to build a DOS file that can
|
||
be uploaded to IST/RAMP for processing.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM Mainframe for IST/RAMP--30xx with MVS.
|
||
- Interactive under TSO and Roscoe.
|
||
- IBM PC/XT or compatible for RAMP<->Link.
|
||
- 5K12 memory.
|
||
- Two diskette drives or one diskette and fixed disk drives.
|
||
|
||
Software Requirements.
|
||
|
||
- MS DOS Version 2.1 or later.
|
||
|
||
User Interface/lEase of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- Training manual with sample data bases and detailed tutorial.
|
||
- User manual.
|
||
- Three-day on-site training.
|
||
- Pocket reference.
|
||
|
||
Developer/Vendor International Security Technology, Reston, VA; (703)
|
||
471-0885.
|
||
|
||
Remarks.
|
||
|
||
RAMP<->L~ makes it unnecessary for the analyst to be familiar with the
|
||
details of 1ST/RAMP data entry formats. The analyst enters the data
|
||
off-line and logs onto a mainframe where 1ST/RAMP is resident using
|
||
any communications software package that has a "file send" command.
|
||
JANBER
|
||
|
||
Methodology: Qualitative. Janber initiates a yes/no questionnaire
|
||
and checklIst for collecting information about security controls
|
||
already in place. The software weights safeguards currently in place
|
||
and measures them against the level of data being processed on the
|
||
system. These data classification levels point to highly sensitive but
|
||
unclassified information to highly classified data. The analysis
|
||
provides a linguistic characterization of the level of vulnerability
|
||
from 2-28, with 28 representing a worst-case scenario.
|
||
Vulnerabilities, safeguards and their weights can be preestablished by
|
||
the vendor to meet the organization requirements. Safeguards that are
|
||
required but not implemented are flagged in a report and
|
||
recommendations for safeguards that meet organizational guidelines and
|
||
directives are provided. Users have the capability of performing
|
||
"what-if' scenarios to evaluate the effectiveness of certain
|
||
safeguards.
|
||
|
||
The Janber application allows users to define standard entries for
|
||
specific data fields. The results of the data collection and analysis
|
||
are maintained on separate data bases. The developer recommends that
|
||
both the analysis and the data collection be performed by different
|
||
personnel to assure the integrity of the results. The developer
|
||
further recommends that the analysis be performed by computer security
|
||
professionals to achieve optimum results. The software provides a
|
||
capability to track action items resulting from the evaluation.
|
||
|
||
Janber creates a database of information on all systems surveyed and
|
||
provides a data base query capability for contingency planning and
|
||
recovery operations.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 10MB Feed drive and one diskette drive.
|
||
|
||
Operating system.
|
||
|
||
- MS-DOS Version 2.0 or higher.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
- On-line help facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training provided upon request.
|
||
|
||
Developer/Vendor. Eagan, McAIlister Associates, Inc., Lexington Park,
|
||
MD 20653; (301) 862-3565.
|
||
|
||
Remarks.LAVA (Los Alamos Vulnerability and Risk Assessment)
|
||
|
||
Methodology: Qualitative and Quantitative. LAVA administers
|
||
questionnaires which results in the identification of missing
|
||
safeguards in 34 areas ranging from password management to personnel
|
||
security and internal audit practices. The software evaluates
|
||
potential consequences and impact upon the organization and the
|
||
ultimate loss exposure (risks). LAVA considers three kinds of threats:
|
||
natural and environmental hazards; accidental and intentional on-site
|
||
human threats (including the authorized insider); and off-site human
|
||
threats. Detailed LAVA reports provide both qualitative and
|
||
quantitative results of the risks identified.
|
||
|
||
Hardware requirements.
|
||
|
||
- IBM PC- or compatible.
|
||
- 512KB memory.
|
||
- 360KB and 720KB diskette drives; or 1.2MB fixed drive and
|
||
one 360~ diskette drive.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Interactive questionnaires.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- On-site training.
|
||
- Demonstration diskette.
|
||
|
||
Developer/Vendor. Los AIamos National Laboratory, Los AIamos, NM;
|
||
(505) 667-7777.
|
||
|
||
Remarks.
|
||
|
||
The LAVA methodology stresses a team approach for conducting the risk
|
||
assessment. It is recommended the team be composed of people with a
|
||
broad spectrum of backgrounds and expertise to ensure a thorough
|
||
assessment. It is further recommended that a consensus among the group
|
||
be reached before entering an answer to any of the questions, and that
|
||
in some cases this may be the most difficult part of administering
|
||
this risk management software.
|
||
|
||
Distribution of this package is handled through the National Security
|
||
Agency (contacts include Sam Samuelson (301)~688-6022; Ed Markel (301)
|
||
688-6022; or John LaPaille (301) 688-5331.
|
||
LRAM (Livermore Risk Analysis Methodology)
|
||
|
||
Methodology: Quantitative. A government-developed system, this
|
||
methodology is structured to allow screening of asset/threat-event
|
||
combinations so that only high impact risks are reviewed. The
|
||
methodology focuses attention on the effectiveness of proposed
|
||
security controls as well as those already in place. LRAM is divided
|
||
into three major phases to include project planning, risk analysis,
|
||
and decision support. The initial phase defines the scope of the
|
||
analysis and identifies needed resources and personnel. The second
|
||
phase analyzes the data collected from phase 1. In this second phase,
|
||
risk elements are identified by establishing corresponding threats,
|
||
control and asset components, the results of which are provided as
|
||
input for the final decision support phase.
|
||
|
||
The final decision support phase is meant to assist in the security
|
||
management of information. It is a process to select and list in
|
||
priority order each recommended safeguard on the basis of cost benefit
|
||
estimates and other decision indexes.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 640K memory.
|
||
- One diskette drive and fixed drive.
|
||
|
||
Operating SYstem.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
|
||
|
||
Developer/Vendor~ Lawrence Livermore National Laboratory, Livermore,
|
||
CA; (415) 423-3083 or 543-3082.
|
||
|
||
Remarks.
|
||
MARION
|
||
|
||
Methodology. Qualitative/Quantitative. LION assesses business risks
|
||
associated with information systems drawing on a large database of
|
||
actual incidents. The software incorporates a questionnaire to
|
||
evaluate the level of security that is currently being applied within
|
||
the organization. Each question is allocated a weighting which
|
||
reflects the relative importance according to the analysis of the
|
||
underlying database of events. A score is allocated for each question;
|
||
the responses and scores are stored. The software calculates the
|
||
overall score for 27 categories of security and presents the results
|
||
graphically and in printed form. Once the current security profile
|
||
has been determined, MARION compares each category with industry norms
|
||
which are derived from the database. The software uses the information
|
||
on costs also held iii the database to calculate an estimated
|
||
expenditure in relation to the total security budget. The calculated
|
||
costs are analyzed according to the nature of the security category
|
||
and presented graphically in detailed tables. A "what-if" capability
|
||
allows one to use different budgets to determine the effects on the
|
||
security profile. The effects of the proposed measures can also be
|
||
displayed.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 5l2K memory.
|
||
- Graphics capability.
|
||
|
||
Operating System.
|
||
|
||
- MS DOS 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User Manual.
|
||
|
||
Developer/Vendor. Coopers & Lybrand (United Kingdom firm), Plumtree
|
||
Court, London EC4A 4HT, telephone 01-822-4678.
|
||
|
||
Remarks.
|
||
|
||
MARION is a methodology developed in France. Coopers & Lybrand are the
|
||
agents for the package in the UK. They have worked with a French
|
||
software house PSI to produce an English version of the package and
|
||
supporting reference material.
|
||
|
||
MicroSecure Self Assessment
|
||
|
||
Methodology. Qualitative. An automated software tool that will allow
|
||
PC users to conduct a security self-assessment. The software analyzes
|
||
the PC environment, determines the vulnerabilities, and recommends
|
||
security controls. Those safeguards recommended are designed to
|
||
increase security and reduce exposures in six areas to include system
|
||
integrity, data security, credibility, data integrity, backup and
|
||
disaster recovery, and confidentiality and privacy. The software may
|
||
be customized to meet specific requirements.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 256K memory.
|
||
- One diskette drive.
|
||
|
||
Operating System.
|
||
|
||
- MS DOS 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User Guide.
|
||
- On-line tutorial.
|
||
|
||
Developer/Vendor Boden Associates, East Williston, NY;
|
||
(516) 294-2648.
|
||
|
||
Remarks. An optional question quiz is provided at the end of each
|
||
chapter of the training course. Recommendations for corrective action
|
||
can be printed directly to the printer or written to an ASCII text
|
||
file for editing.
|
||
MINIRISK
|
||
|
||
Methodology. Qualitative. MINIRISK is a tool designed to assess
|
||
computer security vulnerabilities in a micro computer environment. A
|
||
vulnerability assessment questionnaire allows the organization to
|
||
evaluate the adequacy and completeness of individual safeguards areas
|
||
and to reevaluate these same areas after missing safeguards have been
|
||
implemented. During the process of answering the MINIRlSK
|
||
questionnaire, the user identifies missing safeguards in 10 to 50
|
||
vulnerability categories ranging from password management to
|
||
contingency planning and internal audit controls. Safeguards and
|
||
controls considered mandatory by the organization have been appointed
|
||
for each category that is to be reviewed. The absence of certain
|
||
safeguards determines the level of vulnerability on a scale of zero to
|
||
9, with zero being the best case, and 9 the worst. MINIRISK
|
||
establishes a threshold by which to evaluate vulnerabilities that
|
||
exceed an acceptable risk level.
|
||
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 64KB memory.
|
||
- One diskette drive.
|
||
|
||
Software Requirements.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
- Online HELP facility.
|
||
- User defined questionnaire.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training is not offered with the purchase.
|
||
|
||
Developer/Vendor. Nander Brown & Co., Reston, VA.; (703) 689-4580.
|
||
|
||
Remarks. Government organizations may obtain this software at no
|
||
cost.
|
||
PRISM Risk Analysis and Simulation for the PC
|
||
|
||
Methodology. Qualitative. Prism supports development of risk analysis
|
||
modelling, simulation, sensitivity analysis, and graphical
|
||
presentation of results. It also contains system functions to save,
|
||
retrieve, display, and modify existing models. In addition to simple
|
||
algebraic equations, Prism permits use of BASIC-like statements to
|
||
model more complex applications.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 512K fixed drive.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS 2.0 or later.
|
||
|
||
User Interface/lEase of Use.
|
||
|
||
- On-line HELP facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training and on-site seminars.
|
||
- Consulting services available to assist in model development.
|
||
|
||
Developer/Vendor. Palisade Corporation, Newfield, NY;
|
||
(607) 564-9993.
|
||
|
||
Remarks.
|
||
QUICKRISK
|
||
|
||
Methodology: Qualitative. Quikrisk requires the user to input
|
||
information about the systems and facilities on a scenario form. These
|
||
forms pertain to potential threats, current safeguards, and assets.
|
||
Once all of the input information has been entered, the software
|
||
computes the results which provide an annual loss exposure. An
|
||
additional computation is performed which displays a return on
|
||
investment for each control in place. The analyst also has the
|
||
capability of modifying the results of previous computations by
|
||
modifying the input data. In addition, the software is delivered with
|
||
a threat file containing numerous threats and frequencies. The user
|
||
has the capability of adding threats to this list.
|
||
|
||
|
||
Hardware requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- Two diskette drives.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface~se of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
|
||
Developer/Vendor Basic Data Systems, Rockville, MD;
|
||
(301) 269-2691.
|
||
|
||
Remarks.
|
||
RANK-IT
|
||
Methodology. RANK-IT is a risk assessment software package that uses
|
||
the Delphi technique. Delphi is an expert system approach to risk
|
||
ranking. This software automates the Delphi technique by adding
|
||
Comparison Risk Ranking to obtain an ordinally ranked list of the
|
||
items being ranked or to calculate percentage risk values. Each
|
||
ranked item has a numerical value that can be used as a weighting
|
||
factor or a cardinal number value.
|
||
|
||
RANK-IT is used to risk rank system threats, controls,
|
||
vulnerabilities, components, or any other criteria. It also can be
|
||
used to rank other types of business decision alternatives, whether
|
||
quantifiable or not.
|
||
|
||
The developer suggests that the time required to conduct a risk
|
||
ranking using this combined Delphi and Comparison Risk Ranking
|
||
methodology can range from 30 minutes to three hours.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC/XT/AT or compatible or IBM Personal System/2.
|
||
- 5l2KB memory.
|
||
- Single diskette drive or fixed disk (300K memory required).
|
||
- Graphics capability.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- Demonstration diskette.
|
||
- User manual.
|
||
- Tutorial and training diskettes.
|
||
- One-day on-site training upon request.
|
||
|
||
Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA;
|
||
(415) 591-5676.
|
||
|
||
Remarks.
|
||
Risk Analysis System (RA/SYS)
|
||
|
||
Methodology. Quantitative. RA/SYS is an automated risk analysis
|
||
system which processes with a series of interconnected files that can
|
||
assess up to 50 vulnerabilities and assets and 65 threats.
|
||
Calculations are performed on threat/vulnerability pairs to produce
|
||
threat ratings and threat frequencies. A report summarizes loss
|
||
estimates, cost benefit analysis, and return on investment.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 128KB of memory.
|
||
- Two 360KB diskette drives or 640KB fixed drive.
|
||
|
||
Operating System.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
- On-line HELP facility.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Technical assistance available upon request.
|
||
|
||
Developer/Vendor Nander Brown & Co., Reston, VA;
|
||
(202) 689-4580.
|
||
|
||
Remarks.
|
||
|
||
Government agencies may obtain copies of this software at no charge.
|
||
RiskCALC
|
||
|
||
Methodology. Quantitative or Qualitative. An annual loss expectancy
|
||
(ALE) or other metric is computed based on an answered questionnaire.
|
||
The user may optionally change the values of RiskCALC variables to
|
||
determine the most cost-effective safeguards and display the results
|
||
on the user's screen. RiskCALC is part of a 'family' of software tools
|
||
described below. They each provide a standard ASClI file interface for
|
||
exporting and importing RiskCALC variables.
|
||
|
||
o RiskCALC allows the user to answer questions and print
|
||
reports into which values elicited from the questionnaire are
|
||
automatically inserted.
|
||
|
||
o Risk Minimizer identifies an organization's most
|
||
significant risks from a completed analysis. Risk Minimizer may be
|
||
used with other risk management software tools that use the RiskCalc
|
||
file format.
|
||
|
||
0 The System Manager assists in designing or customizing an
|
||
existing risk analysis model.
|
||
|
||
o The Demonstration Models allow the user to develop a
|
||
site-speciiic questionnaire or select one that models several risk
|
||
scenarios.
|
||
|
||
Hardware requirements.
|
||
|
||
- IBM PC or compatible.
|
||
- 5I2KB memory.
|
||
- Fixed drive is optional but recommended.
|
||
|
||
Operating system.
|
||
|
||
MS-DOS Version 2.1 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu driven.
|
||
- On-line help facility.
|
||
- Lotus-like iriterface.
|
||
|
||
Documentation and Training.
|
||
|
||
- User and system administrator manuals.
|
||
- One day on-site training with purchase.
|
||
- A three-day course on computer security and risk management
|
||
is available upon request.
|
||
|
||
Developer/Vendor. Hoffman Business Associates, Inc., Chevy Chase,
|
||
MD., (301) 656-6205.
|
||
|
||
Remarks
|
||
RISKPAC
|
||
|
||
Methodology. Qualitative. This software product is composed of three
|
||
components--questionnaire, surveys, and reports. The results of the
|
||
questionnaire are stored in a 'survey' which provides the basis of the
|
||
analysis. The questions point to discrete categories that provide a
|
||
review of an organization's policies, physical environment, processing
|
||
hardware and the applications and data which make up a system. Each
|
||
of these categories are evaluated separately. A variety of
|
||
questionnaires that apply to several disciplines (e.g., manufacturing,
|
||
banking, and government) are available. 'Reports' provide the results
|
||
of the evaluation expressed on a scale of one to five, with five
|
||
representing a worst-case scenario. The weighting and scoring
|
||
algorithms are based on Kepner/Tregoe type of analysis. The package
|
||
can produce data files that can be input to various database spread
|
||
sheets. Further, the software is equipped with a number of utility
|
||
routines that allow organizations to develop their own questionnaires.
|
||
This 'System Manager' capability is available separately.
|
||
|
||
Hardware Requirements.
|
||
|
||
- IBM PC, PC/XT, or PC/AT or compatible.
|
||
256K ofmemory.
|
||
- Two diskette drives or 10MB fixed drive.
|
||
|
||
Operating system.
|
||
|
||
- MS-DOS Version 2.0 or later.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training provided upon request.
|
||
|
||
Developer/Vendor: Computer Security Consultants, Ridgefield, CT,
|
||
Subsidiary of Computer Security Consultants, LTD.; (203) 431-8720.
|
||
|
||
Remarks.
|
||
RISKWATCH
|
||
|
||
Methodology. Qualitative/Quantitative. The RISKWATCH software is
|
||
capable of analyzing organizations, facilities, systems, applications
|
||
and networks, both large and small. RiskWatch distinguishes between
|
||
financial, critical, sensitive and classified systems. The system
|
||
access relational data bases that contain over thousands of
|
||
relationships between threats, assets, vulnerabilities, losses, and
|
||
safeguards. Responses to a questionnaire which addresses a wide
|
||
variety of job functions is combined with the databases to produce a
|
||
comprehensive risk analysis report. This report also provides an asset
|
||
inventory, a detailed list of vulnerabilities, threat analysis with
|
||
annual loss expectancies and recommended safeguards that include
|
||
return-on-investment. The system provides a query capability for any
|
||
selected threat, asset, vulnerability or safeguard.
|
||
|
||
Hardware requirements.
|
||
|
||
- IBM-XT/AT or compatible.
|
||
- 640K memory.
|
||
- 10MB fixed drive.
|
||
- Graphics.
|
||
- Color monitor.
|
||
|
||
Operating system.
|
||
|
||
- MS DOS Version 2.1 or higher.
|
||
|
||
User Interface/Ease of Use.
|
||
|
||
- Menu-driven.
|
||
|
||
Documentation and Training.
|
||
|
||
- User manual.
|
||
- Training provided upon request.
|
||
|
||
Developer/Vendor. Expert Systems Software, Inc., Long Beach, CA
|
||
(213) 499-3346.
|
||
|
||
Remarks.
|
||
|
||
The software can be customized to meet the needs of both defense and
|
||
civil organizations. LOGICON is authorized to distribute this
|
||
software package, Arlington, VA (703) 486-3500.
|
||
|
||
|