Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 8, 2014 DRAFT1.

Slides:



Advertisements
Similar presentations
11 March 2003DRAFT 1 FSG Open Print JTAPI (Job Ticket API) Claudia Alimpich IBM Printing Systems Division Boulder Colorado
Advertisements

An Overview of the Federal Segment Architecture Methodology
A BPM Framework for KPI-Driven Performance Management
Fact-finding Techniques Transparencies
1 INCOSE Chesapeake Chapter Enterprise SE Panel Discussion L. Mark Walker/LMC 21 March 2007.
DRAFT, Copyright VE6OH, DRAFT1 TEST- SETUP Start.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions August 25, 2014 DRAFT1.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 8, 2014 DRAFT1.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 8, 2014 DRAFT1.
Revised Draft1 Distributed Generation Interconnections - Group Study Process Option: Voluntary Rolling Window Presented to Massachusetts Distributed.
Leverage MarkITS for agile solutions delivery that balances strategic thinking with tactical execution for “Business & Technology Convergence” MarkITS.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Scope of TOGAF ADM The scope of the four architecture domains of TOGAF align very well with the first four rows of the Zachman Framework, as shown in the.
Communicating for Results 9e 9 Key Ideas Defining small group Characteristics of successful problem-solving teams Group formats Small-Group Communication.
Consensus Based Decision Making
Why Enterprise Architecture?
The Design Process. What is Design? What is a Design Process? Design Process Example.
Basic guidelines for the creation of a DW Create corporate sponsors and plan thoroughly Determine a scalable architectural framework for the DW Identify.
Lecture 5 Themes in this session Building and managing the data warehouse Data extraction and transformation Technical issues.
Systems Analysis and Design in a Changing World, Fourth Edition
© Pearson Education Limited, Chapter 6 Fact-finding Transparencies.
Chapter 4: Beginning the Analysis: Investigating System Requirements
Fact-finding Techniques
Lecture 8 Understanding entity and its environment
Enterprise Architecture
Design Process Overview
WorkOut Method A3 for Facilitators What is a WorkOut? A methodology that helps teams identify opportunities to improve the way work gets done. Why are.
Geog 463: GIS Workshop May 15, 2006 Information Systems Architecture Reading: Zachman 1987.
Chapter 4: Beginning the Analysis: Investigating System Requirements
CQI (TQM) Tools and Time Management. CQI or TQM?? u CQI – Continuous Quality Improvement or u TQM – Total Quality Management Technically, there are some.
Copyright © 1997 by Rational Software Corporation Midterm Exam  When: 3:30 – 4:50PM, Thursday, October 4, 2012  Where: HM 201s  Format  Close book.
Copyright © 2013 Curt Hill Frameworks, Methodologies, Ontologies and Taxonomies Wasn’t that a mouthful?
© 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 1 A Discipline of Software Design.
An Introduction to Software Architecture
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Copyright © 2013 Curt Hill The Zachman Framework What is it all about?
Using Business Scenarios for Active Loss Prevention Terry Blevins t
BMAN Integrative Team Project Week 2 Professor Linda A Macaulay.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
By: Viral Rathod Aman Goyal. 1. Enterprise Architecture. 2. History of Enterprise Architecture 3. Overview of Zachman Framework 4. The Owner’s Perspective.
Spreadsheet skills Castle College. Objectives Look into what is a Spreadsheet. Gain some understanding into some of the functions of a Spreadsheet. Discuss.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Ethics.ppt1 TDT Information Systems, Spring 2006 Today: Course Summary John Krogstie, IDI.
1 Chapter 10 Fact-Finding Techniques Transparencies.
Database Analysis and the DreamHome Case Study
Information Systems Engineering. Lecture Outline Information Systems Architecture Information System Architecture components Information Engineering Phases.
Systems Analysis and Design in a Changing World, Thursday, Feb 1.
CS 772: Global Knowledge Networks V. “Juggy” Jagannathan CSEE, West Virginia University.
Chapter 5 Uma Gupta Introduction to Information Systems  2000 by Prentice Hall. 5-1 Database Design and Management.
Job Analysis - Competency Modeling MANA 5322 Dr. Jeanne Michalski
1 Fact-Finding Techniques. 2 u Critical to capture necessary facts to build the required database application. u These facts are captured using fact-finding.
Chapter 10 Fact-finding Techniques 1 © Pearson Education Limited 1995, 2005.
1 Fact-finding Techniques © Pearson Education Limited 1995, 2005.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Project Initiation at The Regence Group 12/19/2015John Garrigues1.
® Forging new generations of engineers. Design Process Review.
How to Build Test Inventory Test inventory is built and updated as the software project moves from phase to phase –Start with Requirements List the actual.
The Enterprise Architecture Rush Natty Gur The EA group IASA director of technology.
Enterprise Architectures. Core Concepts Key Learning Points: This chapter will help you to answer the following questions: What are the ADM phase names.
RISK MANAGEMENT IN THE PUBLIC SECTOR CONVERGING MULTIPLE STAKEHOLDER’S EXPECTATIONS Organised by National Treasury Presented by WELEKAZI DUKUZA CEREBRO.
Design Process Overview. A design process is a systematic problem-solving strategy, with criteria and constraints, used to develop many possible solutions.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Understanding Enterprise Architecture
Zachman Framework Lecture 2.
Management & Planning Tools
An Introduction to Software Architecture
Systems Architecture & Design Lecture 1 Introduction
Presentation transcript:

Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 8, 2014 DRAFT1 Chapter 3: Enterprise Security Using Zachman Framework

What is Security Architecture? Why Do We Need It? Architecture is the design of a complex structure that enable change and reuse –An office building blueprint –Peoplesoft solution architecture –An enterprise architecture Enterprise architecture is the architecture of an enterprise, e.g. –The Ohio State University –The State Department The goal of strategy and enterprise architecture is enterprise agility, i.e. what’s needed for competitiveness and success 10/8/2014 DRAFT2 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Enterprises are Very Complex and Changing Imagine a complex building: The US Capitol –Its blueprints capture bricks, mortar, plumbing, electrical, HVAC Imagine an enterprise, such as the US Congress –Its enterprise architecture includes the building blueprints… plus: –The people, the furniture, the computers, electronics, and constant change Incorporating cybersecurity requirements in the enterprise change process –assures that changes result in secure systems and a secure enterprise 10/8/2014 DRAFT3 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

The Zachman Framework for Enterprise Architecture Periodic Table of Enterprise Architecture Invented by John A. Zachman in mid 1980s Utilized by over 3000 large enterprises to gain self understanding and agility 10/8/2014 DRAFT4 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

10/8/2014 DRAFT5 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Primitive Models versus Composite Models A primitive model resides only within 1 cell A primitive model can exhaustively answer one of the 6 fundamental interogatives (questions): What, How, Where, When, Who, Why, for example: –What are all of the roles in an enterprise (Who?) –What are all of the processes in the enterprise (How?) Composite model crosses between columns, e.g. a Role X Process matrix 10/8/2014 DRAFT6 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

How do Architecture Frameworks Help Us with Cyber Security? NIST Special Publication defines the role of Risk Executive –Risk executive is in charge of business continuity and disaster recovery, among other risks To do continuity and DR, an exhaustive list of enterprise processes is required, i.e. what we populate Zachman framework column 2 with (How?) –Risk executive needs a blueprint of the organization (Enterprise Architecture) to know whether or not to approve changes If you conduct changes without a blueprint, catastrophy is likely, e.g. building collapses 10/8/2014 DRAFT7 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Everyone Has Their Own Specifications Zachman rows represent the full range of specification perspectives –Executive –Business Management –Architect –Engineer –Technician –The Enterprise Examples of common cybersecurity specifications: System Security Plan, Plan of Actions and Milestores, Accreditation Letter 10/8/2014 DRAFT8 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

The Goldmine is in Row 2 Row 2 is the Business Management perspective –Business managers control investment decisions for the enterprise, i.e. the money Row 2 models are hierarchies –All of the primitives are categorized in the hierarchy –Closeness in the hierarchy implies similarity –A deep hierarchy represents a detailed understanding of each set of primitives 10/8/2014 DRAFT9 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Frameworks for Row 3 Row 3 contains models from the Architect’s perspective Architects do not specify every detail, that’s what engineers do in Row 4 –Architects specify the architecturally significant constraints, i.e. critical success factors Example Row 3 Frameworks –For defense industry: DODAF, MODAF –Solution Architectures: TOGAF, IEEE-1471, ISO/IEC –Telecomm and Finance: RM-ODP 10/8/2014 DRAFT10 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Architectural Problem Solving Patterns Business Question Analysis Document Mining Hierarchy Formation Enterprise Workshop Nominal Group Technique Minipatterns for Problem Solving Meetings 10/8/2014 DRAFT11 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Business Question Analysis Determines the appropriate metamodel for an enterprise architecture –“Metamodel” means what kinds of entities and relationships will we model Starts with questions from business owners –Proceeds with selection of primitives (columns) from the Zachman Framework –The business questions drive the relationships that will be modeled, i.e. using matrices across columns 10/8/2014 DRAFT12 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Document Mining Extracts primitives from enterprise documentation, i.e. populates row 1 Document mining can be exhaustive, i.e. capture all the primitive entities in a column Document Mining is preferable to interviewing because: –Documents usually represent a consensus of two or more people –1:1 interviews represent only 1 opinion on a certain day in a certain life 10/8/2014 DRAFT13 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Hierarchy Formation Hierarchy formation populates row 2 of the Zachman Framework A hierarchy is created using a cards on the wall exercise, group discussion –Non-experts can perform this task –Experts are used in an Enterprise Workshop to confirm and perfect the results Hierarchies help us understand the primitives and find commonality 10/8/2014 DRAFT14 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Enterprise Workshop Document Mining and Hierarchy Formation can be conducted by non-expert teams –The non-experts draft a 70% solution, imperfect, but much better than a blank page Business owners and experts are called into the Enterprise Workshop to take the 70% solution to 100%, in terms of accuracy and completeness 10/8/2014 DRAFT15 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Nominal Group Technique NGT is a classic idea creation technique, e.g. a powerful form of brainstorming –It very quickly generates results without substantial time wasted in discussing digressions NGT involves: –Silent writing – to formulate ideas quickly in a large group working in parallel –Group notes – recording of the ideas on a flip chart so that everyone can be a heads-up active participant –Group definitions – information sharing to define the ideas –Straw poll – prioritizing the ideas by casting multiple informal votes 10/8/2014 DRAFT16 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

Minipatterns for Problem Solving Meetings Get Organized Breakouts Flipcharts Time Management Groundrules Idea Parking Lot Other Problem Solving Catalogs 10/8/2014 DRAFT17 Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions

REVIEW CHAPTER SUMMARY Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions 10/8/2014 DRAFT18