Risk Assessment in Layered Solutions
Commercial Solutions for Classified (CSfC) - Risk Analysis
Christopher Martinez1, Robert Haverkos2
1Purdue University, Marti606@Purdue.edu, 2Purdue University, RHaverko@Purdue.edu
Slide 1
Risk Assessment in Layered Solutions Commercial Solutions for - - PowerPoint PPT Presentation
Risk Assessment in Layered Solutions Commercial Solutions for Classified (CSfC) - Risk Analysis Christopher Martinez 1 , Robert Haverkos 2 1 Purdue University, Marti606@Purdue.edu, 2 Purdue University, RHaverko@Purdue.edu Slide 1 Presentation
1Purdue University, Marti606@Purdue.edu, 2Purdue University, RHaverko@Purdue.edu
Slide 1
Slide 2
The Original Abstract
solution is always greater than zero.
risk assessment for the overall solution”.
individual system, but which impact the overall two-layer solution”. *In a “two independent layer” situation.
Slide 3
– Devices (hardware or software) used to provide security to an information system.
– The combination of Mechanisms in a security solution.
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11 The identifies what sort of Mechanism the Layered Solution is using. is the specific example of the class. contains a list of all the Mechanisms that make up the Layered Solution. contains any special rules that may need to be applied to this specific implementation is what contains the risk score generated by the model.
Slide 12
Slide 13 The identifies what sort of Mechanism the Layered Solution is using. is the specific example of the class. contains a list of the Security Critical Attributes of the Mechanism. contains any special rules that may need to be applied to this specific implementation. is what contains the risk score of the Mechanism. defines the type of interactions the Mechanism can have with other Mechanisms.
Slide 14
Slide 15 The identifies the Security Critical Attribute in the Mechanism. is the specific example of the Security Critical Attribute. is the first field representing interaction between different SCA’s. functions same as the compromise field. It contains a list
this layer.
matter Expert (SME) in order to define this value is an alternative way
lists the modifications or specific changes.
Slide 16
Slide 17
Mechanism
Code
Manufacturer
O.S. Machine National Origin
Administrator Configuration
Policy
Slide 18
Mechanism
Code
Manufacturer
O.S. Machine National Origin
Malicious Administrator Configuration
Policy
Slide 19
Mechanism Risk : ____
Code
Manufacturer
O.S. Machine National Origin
Administrator Configuration
Policy
.4% .1% .3% .4% .5% .2% .2% .3%
Weakest Link
Slide 20
Mechanism Risk
Code
Manufacturer
O.S. Machine
National Origin
Administrator Configuration
Policy
.4% .5% .3% .5% .5% .5% .5% .5%
.5%
Slide 21
Slide 22
Slide 23 (Final)