Key System Engineering Processes for (Cost) Effective Cyber Security in a Dynamic Threat Environment. Kevin Stoffell September 11, 2015.

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

1 PROJECT MANAGEMENT ROLE OF KEY PERSONNEL Bernd Madauss International Space University Strasbourg February, 2011
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Adopt & Adapt Tips on Enterprise Data Management Annette Pence September 10, 2009 MITRE.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Managing the Information Technology Resource Course Introduction.
Sylnovie Merchant, Ph.D MIS 210 Fall 2004 Lecture 1: The Systems Analyst Project Management MIS 210 Information Systems I.
Purpose of the Standards
Systems Engineering Approach to MPS Risk Management Kelly Mahoney Presented at the Workshop for Machine Protection in Linear Accelerators.
1 ECE 453 – CS 447 – SE 465 Software Testing & Quality Assurance Case Studies Instructor Paulo Alencar.
INCOSE 1 st reactions. One other area that struck me has the sheer number of levels of proficiency—in ours we are going with 5 and the first one is limited.
Configuration Management for Transportation Management Systems Establishing and Maintaining System Integrity.
Compliance System Validation - An Audit Based Approach December 2012 Uday Gulvadi, CPA, CIA, CISA, CAMS Director - Internal Audit, Risk and Compliance.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
TTBIZLINK PROJECT MINISTRY OF TRADE, INDUSTRY, INVESTMENT & COMMUNICATIONS.
CPTE 209 Software Engineering Summary and Review.
1COM6030 Systems Analysis and Design © University of Sheffield 2005 COM 6030 Software Analysis and Design Lecture 2- Software Process Models and Project.
Information Systems Security Computer System Life Cycle Security.
 Definitions  Goals of automation in pharmacy  Advantages/disadvantages of automation  Application of automation to the medication use process  Clinical.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
Effective Management and Compliance 1 ANA GRANTEE MEETING  FEBRUARY 5, 2015.
1 Chapter 2 The Process. 2 Process  What is it?  Who does it?  Why is it important?  What are the steps?  What is the work product?  How to ensure.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
NIST Special Publication Revision 1
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
SCSC 311 Information Systems: hardware and software.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
1 Project Management Introduction. 2 Chap 1 What is the impact? 1994: 16% of IT projects completed “On-Time” 2004 : 29% of IT projects “On- Time” 53%
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
Database Administration
MGT 461 Project Management Institute Knowledge Areas
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Quality Activity Matrix Presented by Sandra Toalston President, SanSeek 1.
Database Systems: Design, Implementation, and Management Ninth Edition Chapter 15 Database Administration and Security.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, & Management, 6 th Edition, Rob & Coronel Learning Objectives.
Dr. Young J. Kim.  INCOSE Definition ( ◦ “An interdisciplinary approach & means to enable the realization of successful systems. It focuses.
M ONITOR & C ONTROL Focus is on Integrated Change Control 1.
Lecture 2.1b: DoD Acquisition Process (SEF Ch 2)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Unit 6a: Clinical Decision Support System (CDSS) basics Decision Support for Quality Improvement This material was developed by Johns Hopkins University,
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
1 Lecture 2.3: SE Process (SEF Ch 3) Dr. John MacCarthy UMBC CMSC 615 Fall, 2006.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Configuration Control (Aliases: change control, change management )
Handbook of Informatics for Nurses and Healthcare Professionals Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights.
CS4311 Spring 2011 Process Improvement Dr
Chapter 18 Maintaining Information Systems
Project Management and Information Security
Clinical Engineering Lecture (3).
Definitions.
Assist. Prof. Magy Mohamed Kandil
Presentation to Project Certification Committee, DoIT August 24, 2008
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Software Reviews.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Working with Project Management Processes
Presentation transcript:

Key System Engineering Processes for (Cost) Effective Cyber Security in a Dynamic Threat Environment. Kevin Stoffell September 11, 2015

Introduction  Cyber Environment Challenges  Cyber Engineering as a Specialty  Effectiveness of Cyber Security Measures  High value return SE activities  Summary  Resources  Questions

Cyber Environment Challenges  Speed/Flexibility of change requirements are generated by the dynamic Cyber environment.  Complexity of system/component interactions  Frequency of component refresh/update  Time/Resource constraints for security requirements in software/IT development  Inherent limitations in end-user operator skills

Cyber Engineering as a Specialty  Cyber Security vs. Information Assurance vs. Computer Security  Information System Security Engineering Often incorrectly applied to System Administrators and technicians.  “Cyber Security Engineering is simply System Engineering with a healthy does of paranoia.”

Effectiveness of Cyber Security Measures  Confidentiality, Integrity, Availability  Common Trade-off decision conflicts Confidentiality vs. cost/schedule/performance Availability vs. cost/schedule/performance  Security requirements as functional requirements  Security requirements as design constraints

High Value Return SE Activities

Human Resource Management  Quality Cyber Security Professionals are costly  Continuous Training/Education is required  Individual skills are inherently constrained Grow your own customized skill sets  Intellectual engagement is critical for retention

Configuration Management  Configuration Item selection can be challenging NOT asset management  Change process must allow for rapid changes  Impact Analysis prior to change is critical  Post-Change follow-up and testing  Audit, Audit, Audit

Risk Management  Critical for cost management  Avoid the ‘solid gold wall’  Requires intelligence input to be effective  Critical tie-ins to: Human Resource Management Configuration Management Requirements Analysis Architectural Design Maintenance

Requirement Analysis/Architectural Design  Careful allocation of functional requirements is critical Challenge: Avoiding overlaps and gaps.  Must support and coordinate with: Rapid Configuration Management Verification/Validation Maintenance Human Resource Management

Verification/Validation  Documented test procedures are critical  Must be highly automated  Must Support Rapid Verification/Validation after change Configuration Management Audits Human Resource capabilities Continuous Monitoring during Maintenance phases

Maintenance  “Sustain a Capability to Provide a Service”  Cyber maintenance is distinctly different from physical world maintenance Continuous Monitoring  Challenge: Overburdening of Maintenance (monitoring) requirements on staff results in degradation of capability  Personnel discipline during troubleshooting/repair activities to support Configuration Management  Access to appropriate human skill sets critical

Summary  Cyber Environment Challenges  Cyber Engineering as a Specialty  Effectiveness of Cyber Security Measures

Resources  INCOSE Systems Engineering Handbook version  National Institute of Standards and Technology Special Publication Rev 1, “Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach”  National Institute of Standards and Technology Special Publication Rev 3, “Recommended Security Controls for Federal Information Systems and Organizations”  Department of Defense Instruction , “Information Assurance Implementation”  Project Management Institute, “Project Management Body of Knowledge (PMBOK)” Fourth Edition.  Information Assurance Technical Framework ver 3.1, National Security Agency

QUESTIONS?