Ground Truth Competency Assessment for Smart Grid Cyber Security
TCIPG May 4, 2012 Michael Assante President, NBISE David H. Tobey, Ph.D. Director of Research
Ground Truth Competency Assessment for Smart Grid Cyber Security - - PowerPoint PPT Presentation
Ground Truth Competency Assessment for Smart Grid Cyber Security TCIPG May 4, 2012 Michael Assante President, NBISE David H. Tobey, Ph.D. Director of Research The Need for Cyber Defenders "Everywhere I go, across the country, CEOs and
TCIPG May 4, 2012 Michael Assante President, NBISE David H. Tobey, Ph.D. Director of Research
2
"Everywhere I go, across the country, CEOs and business leaders tell me that
power their companies. They believe, and this administration believes, that a globally competitive economy requires a globally competitive workforce…” Secretary of Commerce John Bryson
Demand Conventional & Hydro Generation Demand Response Nuclear Energy Efficiency
Plug-In Hybrid Electric Vehicles / Storage
Rooftop Solar / Local Wind Development Wind & Variable Generation
“smart grid”
Drivers Policy Security Economic
cyber security reliability
Building the 21st century grid requires a comprehensive and coordinated approach to policy and resource development – looking at the grid as a whole, not as component parts.
1960 1970 1980 1990 2000 2010 Devices
Mainframe Mini PC Internet Hosts Devices & Microcontrollers
Organizations Departments People Devices Things
Requires major productivity gains and accelerated skill development
Performance Support & Simulation
Definition and Competency Analysis
Assessment 3. Instructional & Simulation Design 4. Proficiency and Performance Assessment 5. Professional Development Plans
Source: Assante, M. J. & Tobey, D. H. (2011) Enhancing the Cybersecurity Workforce. IEEE IT Professional, 13: 12-15.
Example from NBME Examinee Performance Profile
The project contributes to the Department of Energy’s efforts to develop a competency model and explore assessment methods focused on the job responsibilities and unique skill set of Smart Grid cybersecurity specialists. This work is designed to provide a foundation for industry’s ongoing efforts to transform and develop the workforce necessary to achieve the benefits of grid modernization.
Those primarily responsible for operational security functions for day- to-day operations, but not engineering and architecture, in smart grid environments.
Examination of the technical, problem solving, social and analytical skills used by senior cyber security staff in the daily execution of their responsibilities.
A measurement model for assessing knowledge, skills, and abilities in the areas of technical and operational skills.
Panel Officers
Advisory Group
(CISO)
Panel Members
Service Gov't Industry Research Vendor
Source: Searle, Justin (2012) AMI Penetration Test Plan, National Electric Sector Cybersecurity Organization.
Narrow Broad Knowledge
(understanding of strategy or procedure)
Inconsistent Consistent Shallow Deep
Skills
(consistency of performance)
Ability
(transfer across domains)
= Master = Apprentice = Journeyman = Novice
Source: Tobey, D. H. et. al. (in press) Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance," National Board of Information Security Examiners, Idaho Falls, ID, OST Working Group Report NBISE-OST-11-01
Source: Tobey, D. H. et. al. (2011) Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance," National Board of Information Security Examiners, Idaho Falls, ID, OST Working Group Report NBISE-OST-11-01
#1 … #2 … #3 … #4 … #5 … #1 … #2 … #3 … #4 … #5 … #1 … #2 … #3 … #4 … #5 … #1 … #2 … #3 … #4 … #5 …
Masters Apprentices Journeymen
Source: Tobey, D. H. et. al. (2011) Predictive Performance Modeling: An innovative approach to defining critical competencies that distinguish levels of performance," National Board of Information Security Examiners, Idaho Falls, ID, OST Working Group Report NBISE-OST-11-01
Knowledge (Understanding)
Skill (Consistency)
Ability
Performance Levels
2 4 6 8 10
Identify Vulnerabilities Exploit vulnerabilities Mitigate Vulnerabilities Penetrate Targets
Foundational Tasks
Composite score
Comparative score
Identify ownership of gateway devices (16.77)
83.8 Average
Identify recon that is within project scope (15.63)
46.8 Low
Search online sources for useful information about a target (15.45)
53.5 Average
Differentiating Tasks (with weights)
Analyze data found on compromised machines to enable exploitation deeper into the network (24.02)
36.0 Average
Identify major assets subject to attacks (23.67)
87.2 High
Identify targets for potential exploitation (23.67)
56.0 High
Analyze data found on compromised machines for strategic value as seen by a worst case attacker (23.60)
26.2 Low
Overall Score
My Score
54.9 Average
Knowledge Skill Ability
Identify recon that is within project scope
86.5 27.4 47.3
Source: International Center for Leadership in Education (ICLE) Rigor/Relevance Framework (Daggett, 2000)
current achievement (KSAs) by quadrant: 1. Foundational Knowledge 2. Foundational Skill 3. Differentiating Skill 4. Ability
to a personal development plan
State Analysis What are my strengths? What are my weaknesses? Feedback I have received? Conclusion 1__________, 2.__________, 3__________, 4._________, 5.___________ 1__________, 2.__________, 3__________, 4._________, 5.___________ 1__________, 2.__________, 3__________, 4._________, 5.___________ 1__________, 2.__________, 3__________, 4._________, 5.___________ Resource Listing Reference work #1 Reference work #2 Online course #1 Online course #2 US-Cert: Cyber Security Policy Planning and Preparation – PDF download NIST: Guide to Industrial Control Systems (ICS) Security – PDF download SANS: Hacker Techniques, Exploits & Incident Handling – LMS course SANS: Reverse-Engineering Malware: Analysis Tools and Techniques – LMS course Improvement Timeline When do I want or need to achieve the desired state? What is my schedule to work on these focus areas? Focus Area #1 : Short term________; Medium term_______; Long term_________ Focus Area #2 : Short term________; Medium term_______; Long term_________ Focus Area #1 : Day / time 1______; Day / time 2_______; Day / time 3________ Focus Area #2 : Day / time 1______; Day / time 2_______; Day / time 3________ Notes Document any important notes or other items in this section
Clicking on any symbol instance in the RRF brings up the table
Planning and Development
Assessment Summary
Assessment Summary
Assessment Results with KSA Metrics
Competency Model Content Model Object Model Development Model
Adapted from Ostyn (2005) Competency Data for Training Automation
Training Objects (CourseLets) SCORM/CMI-5 XML Library Assessment Objects (TestLets) Simulation Objects (SimLets)
Facilitate translation of functional roles into job roles Clearly distinguish knowledge, skill, and ability Determine factors that differentiate performance at varying levels of skill Identify the critical factors that predict performance Competency models describe Job performance models prescribe
26
JPM’s help to determine who should be developed (aptitude), how to development them (skill profiles), and when they are ready to take the next step (performance-based learning)
Contact: Michael Assante Michael.assante@nbise.org