Risk analysis and management using ontology Formal Analysis of Risk in Enterprise System (FARES) Presentation by Drs Peter Stephenson and Paul Stephen.

Slides:



Advertisements
Similar presentations
Copyright © Allyn & Bacon (2007) Research is a Process of Inquiry Graziano and Raulin Research Methods: Chapter 2 This multimedia product and its contents.
Advertisements

A plan to deploy Ontology mediation information flow architecture for US Customs and Border Protection Presentation by OntologyStream Inc Paul Stephen.
Basics of Knowledge Management ICOM5047 – Design Project in Computer Engineering ECE Department J. Fernando Vega Riveros, Ph.D.
Total Information Awareness with Informational Transparency in Secure Channels March 16, 2005 Core Ontology safeguarding national security Ontology Tutorial.
OASIS Reference Model for Service Oriented Architecture 1.0
Lecture 5 Themes in this session Building and managing the data warehouse Data extraction and transformation Technical issues.
A Framework for Ontology-Based Knowledge Management System
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Understanding Metamodels. Outline Understanding metamodels Applying reference models Fundamental metamodel for describing software components Content.
Software Requirements
Describing Syntax and Semantics
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
The Software Product Life Cycle. Views of the Software Product Life Cycle  Management  Software engineering  Engineering design  Architectural design.
Foundations This chapter lays down the fundamental ideas and choices on which our approach is based. First, it identifies the needs of architects in the.
Course Instructor: Aisha Azeem
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Redefining Perspectives A thought leadership forum for technologists interested in defining a new future June COPYRIGHT ©2015 SAPIENT CORPORATION.
Enterprise Business Information Model Enterprise Data Services.
Architectural Design.
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
Systems Analysis and Design: The Big Picture
Not part of three month project Advanced Architectures: Simple and Advanced Orb Architecture OntologyStream architecture The first part of this presentation.
SEC835 Database and Web application security Information Security Architecture.
ECTS definition : Student centred system, Student centred system, Based on student workload required to : Based on student workload required to : Achieve.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Operational Capability: An underlying simplification of a data encoding standard has been developing over the past decade and is being demonstrated in.
Robert Tairas, Marjan Mernik, Jeff Gray Using Ontologies in the Domain Analysis of Domain-Specific Languages Workshop on Transformation and Weaving Ontologies.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
An Introduction to Software Architecture
Business Systems Development SDLC and introduction to the Microsoft Solutions Framework Team and Process Models.
OHT 23.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The benefits of use of standards The organizations involved in standards.
Knowledge representation
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
1 Chapter 14 Architectural Design 2 Why Architecture? The architecture is not the operational software. Rather, it is a representation that enables a.
1 ECE 453 – CS 447 – SE 465 Software Testing & Quality Assurance Instructor Kostas Kontogiannis.
Software Requirements Engineering: What, Why, Who, When, and How
Chapter 13 Architectural Design
Software Engineering Principles Principles form the basis of methods, techniques, methodologies and tools Principles form the basis of methods, techniques,
University of Southern California Center for Systems and Software Engineering Model-Based Software Engineering Supannika Koolmanojwong Spring 2013.
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
Networking and Health Information Exchange Unit 5b Health Data Interchange Standards.
Software Acquisition and Project Management Lesson I: Introduction.
Part4 Methodology of Database Design Chapter 07- Overview of Conceptual Database Design Lu Wei College of Software and Microelectronics Northwestern Polytechnical.
Computing and SE II Chapter 9: Design Methods and Design Models Er-Yu Ding Software Institute, NJU.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
27/3/2008 1/16 A FRAMEWORK FOR REQUIREMENTS ENGINEERING PROCESS DEVELOPMENT (FRERE) Dr. Li Jiang School of Computer Science The.
1 Software Engineering: A Practitioner’s Approach, 7/e Chapter 2 Process: A Generic View Software Engineering: A Practitioner’s Approach, 7/e Chapter 2.
1 Software Design Lecture What’s Design It’s a representation of something that is to be built. i.e. design  implementation.
Cloud security
Networking and Health Information Exchange Unit 6a EHR Functional Model Standards.
Deployment of Ontology Mediation Of Information Flow Modified from Presentations made in 2002, 2003 and 2004 This material is not specific to any project.
Context for Sarbines -Oxley Sarbines-Oxley makes executives and officers of all public corporations listed on any American stock exchange take personal.
ANALYSIS PHASE OF BUSINESS SYSTEM DEVELOPMENT METHODOLOGY.
An Agile Requirements Approach 1. Step 1: Get Organized  Meet with your team and agree on the basic software processes you will employ.  Decide how.
The Knowledge Sharing Foundation Dr. Paul S. Prueitt, OntologyStream Inc Research Professor, The George Washington University Founder (1992) BCNGroup.org.
Chapter : 9 Architectural Design
UTA/ARRI. Enterprise Engineering for The Agile Enterprise Don Liles The University of Texas at Arlington.
Using OWL 2 For Product Modeling David Leal Caesar Systems April 2009 Henson Graves Lockheed Martin Aeronautics.
ITIL Foundation Online Delivery Method : Online Duration : 60 Days The ITIL® Foundation Certificate allows delegates to gain a comprehensive grounding.
Object Design More Design Patterns Object Constraint Language Object Design Specifying Interfaces Review Exam 2 CEN 4010 Class 18 – 11/03.
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
1 These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 5/e and are provided with permission by.
Software Project Configuration Management
Integrating SysML with OWL (or other logic based formalisms)
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
TechStambha PMP Certification Training
Quality management standards
Ontology Reuse In MBSE Henson Graves Abstract January 2011
Presentation transcript:

Risk analysis and management using ontology Formal Analysis of Risk in Enterprise System (FARES) Presentation by Drs Peter Stephenson and Paul Stephen Prueitt Draft version 1.0 April 4, 2005

High level Business Model The Advanced Group Inc (sales and marketing) The Center for Digital Forensics Studies LTD (tool development) OntologyStream Inc (ontology repository) Other partners (core technology providers, certification providers, authorized providers, outsourced management) Products FARES (Formal Analysis of Risk in Enterprise System) TRM (True Risk Management, requires FARES to start) Tools DOF (Differential Ontology Framework with composite of patented technologies, designed to be refactored (in 2007 ) into CoreSystem virtual engine) Assessment instruments and methodologies Paring and filtering tools acting on real time data flow Pricing FARES ( $75 K plus, 90 day process) TRM ( $50 K plus, 1 year process) must follow a FARES project. Sales expectations (Now completing one $100K project, one new project almost sold to begin in April.) Two new projects each month between May and December. One very large project ($500 phase 1 is possible to begin in April).

The FARES certification (Doug Weidner and Art Murray) Certification and university curriculum (George Washington University) The Center for Digital Forensics Studies LTD (tool and methodology development) OntologyStream Inc (ontology standards, formal and science considerations) Products FARES Certification, degree programs within the knowledge science and knowledge technology disciplines. Pricing FARES ( $1,995 per individual instruction, two weeks followed by three month Risk Practicum project (discounted FARES project rate (10%)) Enrolment expectations: ( As the market for FARES develops, we expect to train 200 – 500 certified practitioners. At the present time, the market need is very well defined, but no comparable tool exists other than FARES.) Benefits: Certification will allow participation in an Open but Protected Red Hat type business model, controlled by the Center for Digital Forensics Studies.

FARES Institute Certification Prerequisites: Some computer security certification and/or knowledge management certification. Certification authority, KMPro.org, KMCI, etc; will provide the necessary training required to run a FARES project. Contributes to a Public but Protected ontology repository where top down regulatory constraints produce standard configurations that exist as potential TO-BE frameworks The practicum will be supported using FARES tools and methodology, with FARES Institute project royalty between 10 – 20 K. FARES project royalty will be fixed at 20% invoiced contract including Time and Materials. Additional oversight by senior Institute personnel to be negotiated. Ontologies Repository Certification of Ontology Construction tools and methodologies On-going research is the responsibility of the FARES Institute Science Board.

On the generality of the FARES product An enterprise system can be any “complex” system. The power that is found in the application of a FARES product comes from the universality of the target of application. For Example: The Formal Analysis of Risk in Enterprise System has been applied to the analysis of data derived from the measurement of acidity levels in fish ponds. This application produces different types of ontology structure as the assessment and analysis methodology is varied. The objective of the application is, however, the same as FARES as originally applied to IT RISKS. Gains is the “other side” of Risk: Analysis of structure and activity leading to a delineation of the categories of RISK to the system. A generalization of this analysis leads to a delineation of categories of GAIN to the system. The development and use of enterprise specific organized sets of concept indicators (ie ontology such as encoded in OWL), is highly natural. Differential Ontology Framework has features related to the perceptual measurement process, the cognitive process and that action activity. Humans understand this architecture.

The Fundamental Diagram explaining DOF Scientific Origins: J. J. Gibson (late 1950s) Ecological Physics, Evolutionary Psychology, and Cognitive Engineering, and other literatures Does a human Community of Practice (CoP) have a perceptional, cognitive and/or action system? Depends: Some groups within the State Department (yes) Some groups at HIST, NSF, DARPA, etc (yes) Some groups in the Academy (yes) Other groups in these same organizations (no, not at all) Knowledge Management community (No, not really) Computer Security and Information Assurance community (No, not really) Iraqi Sunni community in Iraq in March 2005 (this might be forming)

Differential Ontology Framework Applications: Increase the degree of executive decision making capacity and the degree of cognitive capability available to a human community of practice, such as a group in the US State Department, or a group in US Treasury. Business entities use this software to develop a greater understanding of Enterprise Risks.

Development steps, for FARES (applied to State of Michigan Information Assurance Audit) Development of an ontology with an editor like Protégé Concepts related to Threats, Vulnerabilities, Impacts and Inter-domain communications are specified but the set of concepts about Risks is not. Domain expert, Peter Stephenson, used the methods of “Descriptive Enumeration” (DE) and community polling to develop the set of concepts properties and relationships. Peter’s role here is to represent what he knows about these realities without being concerned about computable inference or ontology representation standards. He used Protégé as a typewriter to write out concepts, specify relationship and properties. It is a very creative process. Requires a trained analyst.

The modular architecture in DOF within FARES Three levels – upper, middle and scoped ontology individuals - are used. The top level has a higher level abstraction for each of the core concepts that are in each of five middle level ontologies. Initially these middle level ontologies were developed manually for Threats, Vulnerabilities, Impacts, and Inter-domain communication channels. The current FARES project has automated the development of a set of Risk concepts, through the measurement of event log data. Goal: An “formative” ontology over Risks is to be developed as a consequence of a measurement process over some data set. It is important to see that, in theory, any one of the five “upper level ontologies” can be deleted and built using a data source, the other four, and the process we are proto- typing. Of course, one discovers what one discovers, and human tacit knowledge is involved in any of these HIP processes since human in the loop is core to DOF use. The process makes the developed ontology very specific to the organization that FARES is being delivered to. How does one judge the results?: A “arm-chair” evaluation is used whereby knowledgeable individuals look at how and why various steps are done, and make a subjective evaluation about the results. We also have a mapping between Risk evaluation ontology and a numerical value with quantitative metrics. This mapping provided an informed measure of Risk that can be converted to a financial and legal statement.

Top and middle ontology Scoped ontology Human expert

The Fundamental Diagram First level: Data Instance Example: Custom’s manifest data e i  w I / s i. The event is measured (by humans or algorithms) in a report having both relational database type “structured” data and weakly structured free form human language text. Example: Cyber Security or Information Assurance data e i  co-occurrence patterns The event is measured (by algorithms) and expressed as a record in a log file. In both cases, a FARES or modified FARES product establishes the ontology resources for a more long term “True Risk Analysis” (TRA) process. DOF grounds the Fundamental Diagram with correspondence to several levels of event observation

The Fundamental Diagram Second level: Concept Instance Instance aggregation into a “collapse” of many instances into a category. Example: the concept of “two-ness” allows one to talk about any instances of two things. These aggregation of instance into category produces a bypass to many scalability problems (the scalability issue never comes up in practice). The aggregation process is called “semantic extraction” of instances into Subject Matter Indicators (SMIs) that reference “concepts’. These concepts provide context for any specific data instance. There are several classes of patents on semantic extraction, all of these are useful within DOF, and none is perfect with respect to always being right.

Matching Subject Matter Indicators to concepts SMIs are found using algorithms. The algorithms are complex and require expert use, however the results of good work produces a computational filter that is used to profile the SMI and to thus allow parsing programs to identify SMIs in new sources of data. SMIs always produce a conjecture that a concept is present. Once the conjecture is examined by a human, the concept’s “neighborhood” in the explicit ontology can be reproduced as the basis for a small scoped ontology individual. Concepts are expressed through a process of human descriptive enumeration and iterative refinement. In the State of Michigan FARES project, Threats, Vulnerabilities, Impacts and Inter-domain communications are separate middle DOF ontology each having about 40 concepts. These ontologies also have relationships, attributes and properties and some subsumption (subconcept) relationships. However, they are designed to be subsetting rather than to use as the basis for “inference”. Because we do not use the Ontology Inference Layer in OWL, we convert the OWL formatted information into Ontology referential bases (Orbs) encoded information. Using one of several semantic extraction tools we create SMI representation of the concepts that are encoded in the DOF ontology. Thus a common representational standard exists between the SMIs and the set of explicitly defined concepts. This gives computability.

Large scale FARES deployment model (500K plus)