Skip to:Content
|
Bottom
Cover image for CYBER-RISK INFORMATICS : Engineering Evaluation with Data Science
Title:
CYBER-RISK INFORMATICS : Engineering Evaluation with Data Science
Physical Description:
xxxii, 527 pages : illustrations ; 25 cm.
ISBN:
9781119087519

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010343456 QA76.9.A25 S246 2016 Open Access Book Book
Searching...
Searching...
33000000002382 QA76.9.A25 S246 2016 Open Access Book Book
Searching...

On Order

Summary

Summary

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems.

* Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense

* Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds

* Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author

Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling.

Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).


Author Notes

Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).


Table of Contents

Prologuep. xiv
Reviewsp. xv
Prefacep. xxi
Acknowledgments and Dedicationp. xxix
About the Authorp. xxxi
1 Metrics, Statistical Quality Control, and Basic Reliability in Cyber-Riskp. 1
1.1 Deterministic and Stochastic Cyber-Risk Metricsp. 1
1.2 Statistical Risk Analysisp. 2
1.2.1 Introduction to Statistical Hypothesesp. 2
1.2.2 Decision Rulesp. 3
1.2.3 One-Tailed Testsp. 4
1.2.4 Two-Tailed Testsp. 4
1.2.5 Decision Errorsp. 6
1.2.6 Applications to One-Tailed Tests Associated with Both Type I and Type II Errorsp. 7
1.2.7 Applications to Two-Tailed Tests (Normal Distribution Assumption)p. 11
1.3 Acceptance Sampling in Quality Controlp. 16
1.3.1 Introductionp. 16
1.3.2 Definition of an Acceptance Sampling Planp. 16
1.3.3 The OC Curvep. 16
1.4 Poisson and Normal Approximation to Binomial in Quality Controlp. 19
1.4.1 Approximations to Binomial Distributionp. 19
1.4.2 Approximation of Binomial to Poisson Distributionp. 19
1.4.3 Approximation to Normal Distributionp. 20
1.4.4 Comparisons of Normal and Poisson Approximations to the Binomialp. 21
1.5 Basic Statistical Reliability Concepts and MC Simulatorsp. 21
1.5.1 Fundamental Equations for Reliability, Hazard, and Statistical Notionsp. 23
1.5.2 Fundamentals for Reliability Block Diagramming and Redundancyp. 27
1.5.3 Solving Basic Reliability Questions by Using Student-Friendly Pedagogical Examplesp. 30
1.5.4 MC Simulators for Commonly Used Distributions in Reliabilityp. 47
1.6 Discussions and Conclusionp. 52
1.7 Exercisesp. 52
Referencesp. 60
2 Complex Network Reliability Evaluation and Estimation in Cyber-Riskp. 61
2.1 Introductionp. 61
2.2 Overlap Technique to Calculate Complex Network Reliabilityp. 62
2.2.1 Network State Enumeration and Example 1p. 63
2.2.2 Generating Minimal Paths and Example 2p. 64
2.2.3 Overlap Method Algorithmic Rules and Example 3p. 68
2.3 The Overlap Method: Monte Carlo and Discrete Event Simulationp. 70
2.4 Multistate System Reliability Evaluationp. 71
2.4.1 Simple Series System with Single Derated Statesp. 73
2.4.2 Active Parallel Systemp. 73
2.4.3 Simple Series-Parallel Systemp. 74
2.4.4 A Simple Series-Parallel System with Multistate Componentsp. 75
2.4.5 A Combined System: Power Plant Examplep. 76
2.4.6 Large Network Examples Using Multistate Overlap Techniquep. 77
2.5 Weibull Time Distributed Reliability Evaluationp. 78
2.5.1 Motivation behind Weibull Probability Modelingp. 78
2.5.2 Weibull Parameter Estimation Methodologyp. 79
2.5.3 Overlap Algorithm Applied to Weibull Distributed Componentsp. 80
2.5.4 Estimating Weibull Parametersp. 80
2.5.5 Fifty-Two-Node Weibull Example for Estimating Weibull Parametersp. 85
2.5.6 A Weibull Network Example from an Oil Rig Systemp. 90
2.6 Discussions and Conclusionp. 90
Appendix 2.A Overlap Algorithm and Examplep. 93
2.A.1 Algorithmp. 93
2.A.2 Examplep. 95
2.7 Exercisesp. 101
Referencesp. 103
3 Stopping Rules for Reliability and Security Tests in Cyber-Riskp. 105
3.1 Introductionp. 105
3.2 Methodsp. 107
3.2.1 LGM by Verhulstp. 108
3.2.2 Compound Poisson Modelp. 110
3.3 Examples Merging Both Stopping Rules: LGM and CPMp. 114
3.3.1 The DR5 Data Set Examplep. 114
3.3.2 The DR4 Data Set Examplep. 118
3.3.3 The Supercomputing CLOUD Historical Failure Data-Case Studyp. 119
3.3.4 Appendix for Section 3.3p. 121
3.4 Stopping Rule for Testing in the Time Domainp. 131
3.4.1 Review of Compound Poisson Process and Stopping Rulep. 131
3.4.2 Empirical Bayes Analysis for the Poisson Geometric Stopping Rulep. 132
3.4.3 Howden's Model for Stopping Rulep. 135
3.4.4 Computational Example for Stopping-Rule Algorithm in Time Domainp. 136
3.5 Discussions and Conclusionp. 139
3.6 Exercises 143 Referencesp. 144
4 Security Assessment and Management in Cyber-Riskp. 147
4.1 Introductionp. 147
4.1.1 What Other Scoring Methods Are Available?p. 148
4.2 Security Meter (SM) Model Designp. 152
4.3 Verification of the Probabilistic Security Meter (SM) Method by Monte Carlo Simulation and Math-Statistical Triple-Product Rulep. 154
4.3.1 The Triple-Product Rule of Uniformsp. 156
4.3.2 Data Analysis on the Total Residual Risk of the Security Meter Designp. 158
4.3.3 Triple-Product Rule Discussionsp. 169
4.4 Modifying the SM Quantitative Model for Categorical, Hybrid, and Nondisjoint Datap. 170
4.5 Maintenance Priority Determination for 3 × 3 × 2 SMp. 178
4.6 Privacy Meter (PM): How to Quantify Privacy Breachp. 183
4.6.1 Methodologyp. 184
4.6.2 Privacy Risk-Meter Assessment and Management Examplesp. 185
4.7 Polish Decoding (Decompression) Algorithmp. 187
4.8 Discussions and Conclusionp. 189
4.9 Exercises 190 Referencesp. 199
5 Game-Theoretic Computing in Cyber-Riskp. 201
5.1 Historical Perspective to Game Theory's Originsp. 201
5.2 Applications of Game Theory to Cyber-Security Riskp. 203
5.3 Intuitive Background: Concepts, Definitions, and Nomenclaturep. 204
5.3.1 A Price War Examplep. 205
5.4 Random Selection for Nash Mixed Strategyp. 208
5.4.1 Random Probabilistic Selectionp. 208
5.4.2 Does Nash Equilibrium (NE) Exist for the Company A/B Problem in Table 5.1?p. 209
5.4.3 An Example: Matching Penniesp. 210
5.4.4 Another Game: The Prisoner's Dilemmap. 210
5.4.5 Games with Multiple NE (Terrorist Game: Bold Strategy Result in Domination)p. 211
5.5 Adversarial Risk Analysis Models by Banks, Rios, and Riosp. 213
5.6 An Alternative Model: Sahinoglu's Security Meter for Neumann and Nash Mixed Strategyp. 215
5.7 Other Interdisciplinary Applications of Risk Metersp. 220
5.8 Mixed Strategy for Risk Assessment and Management-University Server and Social Network Examplesp. 221
5.8.1 University Server's Security Risk-Meter Examplep. 221
5.8.2 Social Networks' Privacy and Security Risk-Meter (RM) Examplep. 222
5.8.3 Clarification of Risk Assessment and Management Algorithm for Social Networksp. 224
5.9 Application to Hospital Healthcare Service Riskp. 226
5.10 Application to Environmetrics and Ecology Riskp. 229
5.11 Application to Digital Forensics Security Riskp. 234
5.12 Application to Business Contracting Riskp. 239
5.13 Application to National Cyber security Riskp. 245
5.14 Application to Airport Service Quality Riskp. 253
5.15 Application to Offshore Oil-Drilling Spill and Security Riskp. 257
5.16 Discussions and Conclusionp. 264
5.17 Exercisesp. 266
Referencesp. 271
6 Modeling and Simulation in Cyber-Riskp. 277
6.1 Introduction and a Brief History to Simulationp. 277
6.2 Generic Theory: Case Studies on Goodness of Fit for Uniform Numbersp. 278
6.3 Why Crucial to Manufacturing and Cyber Defensep. 279
6.4 A Cross Section of Modeling and Simulation in Manufacturing Industryp. 280
6.4.1 Modeling and Simulation of Multistate Production Units and Systems in Manufacturingp. 281
6.4.2 Two-State SL Probability Model of Units with Closed-Form Solutionp. 283
6.4.3 Extended Three-State SL Probability Model of UP-DOWN-DERATED Units with MC Simulationp. 284
6.4.4 Statistical Simulation of Three-State Units to Estimate the Density of UP-DOWN-DERp. 289
6.4.5 How to Generate Random Numbers from SL pdf to Simulate Component and System Behaviorp. 296
6.4.6 Example of SL Simulation for Modeling Network of 2-in-SimpIe-Series Two-State (UP-DN) Unitsp. 297
6.4.7 Example of SL Simulation for Modeling a Network of 7-in-CompIex-Topology Two-State (UP-DN) Unitsp. 300
6.5 A Review of Modeling and Simulation in Cyber-Securityp. 301
6.5.1 MC Value-at-Risk Approach by Kim et al. in CLOUD Computingp. 301
6.5.2 MC and DES in Security Meter (SM) Risk Modelp. 302
6.6 Application of Queuing Theory and Multichannel Simulation to Cyber-Securityp. 306
6.6.1 Example 1: One Recovery-Crew Case for Cyber-Security Queuing Simulationp. 306
6.6.2 Example 2: Two Recovery-Crew Case for Cyber-Security Queuing Simulationp. 308
6.7 Discussions and Conclusionp. 308
Appendix 6.A

p. 311

6.8 Exercisesp. 315
Referencesp. 335
7 CLOUD Computing in Cyber-Riskp. 339
7.1 Introduction and Motivationp. 339
7.2 CLOUD Computing Risk Assessmentp. 342
7.3 Motivation and Methodologyp. 343
7.3.1 History of Theoretical Developments on CLOUD Modelingp. 343
7.3.2 Notationp. 344
7.3.3 Objectivesp. 344
7.3.4 Frequency and Duration Method for the Loss of Load or Servicep. 345
7.3.5 NBD as a Compound Poisson Modelp. 346
7.3.6 NBD for the Loss of Load or Loss of CLOUD Service Expectedp. 348
7.4 Various Applications to Cyber Systemsp. 349
7.4.1 Small Sample Experimental Systemsp. 349
7.4.2 Large Cyber Systemsp. 353
7.5 Large Cyber Systems Using Statistical Methodsp. 357
7.6 Repair Crew and Product Reserve Planning to Manage Risk Cost Effectively Using Cyberrisksolver CLOUD Management Java Toolp. 359
7.6.1 CLOUD Resource Management Planning for Employment of Repair Crewsp. 360
7.6.2 CLOUD Resource Management Planning by Production Deploymentp. 365
7.7 Remarks for "Physical CLOUD" Employing Physical Products (Servers, Generators, Communication Towers, Etc.)p. 368
7.8 Applications to "Social (Human Resources) CLOUD"p. 372
7.8.1 Numerical Example for Social CLOUD (200 Employees Performing)p. 376
7.8.2 Input Wizard Example for Social CLOUD (200 Employees Performing)p. 379
7.9 Stochastic CLOUD System Simulationp. 379
7.9.1 Introduction and Methodologyp. 381
7.9.2 Numerical Applications for SS to Verify Non-SSp. 385
7.9.3 Details of Probability Distributions Used in Stochastic Simulationp. 387
7.9.4 Varying Product Repair and Failure Date with Empirical Bayesian Posterior Gamma Approachp. 393
7.9.5 Varying Link Repair and Failure Using Gamma Distributionp. 393
7.9.6 SS Applied to a Power or Cyber Gridp. 394
7.9.7 Error Checking or Flaggingp. 396
7.10 CLOUD Risk Meter Analysisp. 397
7.10.1 Risk Assessment and Management Clarifications for Figures 7.72 and 7.73p. 402
7.11 Discussions and Conclusionp. 405
7.12 Exercisesp. 407
Referencesp. 416
8 Software Reliability Modeling and Metrics In Cyber-Riskp. 421
8.1 Introduction, Motivation, and Methodologyp. 421
8.2 History and Classification of Software Reliability Modelsp. 422
8.2.1 Time-between-Failures Modelsp. 422
8.2.2 Failure-Counting Modelsp. 422
8.2.3 Bayesian Modelp. 423
8.2.4 Static (Nondynamic) Modelsp. 423
8.2.5 Othersp. 424
8.3 Software Reliability Models in Time Domainp. 424
8.4 Software Reliability Growth Modelsp. 425
8.4.1 Negative Exponential Class of Failure Timesp. 425
8.4.2 J-M De-eutrophication Model (Binomial Type)p. 425
8.4.3 Moranda's Geometric Model (Poisson Type)p. 426
8.4.4 Goel-Okumoto Nonhomogeneous Poisson Process (Poisson Type)p. 427
8.4.5 Musa's Basic Execution Time Model (Poisson Type)p. 428
8.4.6 Musa-Okumoto Logarithmic Poisson Execution Time Model (Poisson Type)p. 429
8.4.7 L-V Bayesian Modelp. 431
8.4.8 Sahinoglu's Compound Poisson∧Geometric and Poisson∧Logarithmic Series Modelsp. 433
8.4.9 Gamma, Weibull, and Other Classes of Failure Timesp. 435
8.4.10 Duane Model (Poisson Type)p. 439
8.5 Numerical Examples Using Pedagoguesp. 440
8.5.1 Example 1p. 440
8.5.2 Example 2p. 441
8.6 Recent Trends in Software Reliabilityp. 441
8.7 Discussions and Conclusionp. 442
8.8 Exercisesp. 444
Referencesp. 445
9 Metrics for Software Reliability Failure-Count Models in Cyber-Riskp. 451
9.1 Introduction and Methodology on Failure-Count Estimation in Software Reliabilityp. 451
9.1.1 Statistical Estimation Models, Computational Formulas, and Examplesp. 452
9.1.2 Interpretations of Numerical Examples and Discussionsp. 464
9.2 Predictive Accuracy to Compare Failure-Count Modelsp. 466
9.2.1 Classical Distribution Approachp. 468
9.2.2 Prior Distribution Approachp. 469
9.2.3 Applications to Data Sets and Comparisonsp. 472
9.3 Discussions and Conclusionp. 473
Appendix 9.A

p. 477

9.4 Exercisesp. 478
Referencesp. 482
10 Practical Hands-On Lab Topics in Cyber-Riskp. 483
10.1 System Hardeningp. 483
10.1.1 Generalp. 483
10.1.2 Windows Serversp. 484
10.1.3 Wirelessp. 484
10.1.4 Firewalls, Routers, and Switchesp. 485
10.2 Email Securityp. 486
10.2.1 Identifying Fake Emailsp. 486
10.2.2 Emotion Responsesp. 486
10.3 MS-DOS Commandsp. 487
10.3.1 Mapping Intelp. 488
10.4 Loggingp. 492
10.4.1 Policyp. 493
10.4.2 Understanding Logsp. 494
10.5 Firewallp. 495
10.5.1 Traditional Firewallsp. 495
10.5.2 NGFsp. 496
10.5.3 Host-Based Firewallsp. 496
10.6 Wireless Networksp. 496
10.7 Discussions and Conclusionp. 499
Appendix 10.A

p. 500

10.8 Exercisesp. 501
10.8.1 System Hardeningp. 501
10.8.2 Emailp. 501
10.8.3 MS-DOSp. 502
10.8.4 Loggingp. 503
10.8.5 Firewallp. 503
10.8.6 Wirelessp. 505
10.8.7 Comprehensive Exercisesp. 505
10.8.8 Cryptology Projectsp. 507
Referencesp. 509
What the Cyber-Risk Informatics Textbook and the Author are About?p. 511
Indexp. 513
Go to:Top of Page