💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › risktool.hac captured on 2023-01-29 at 07:55:48.

View Raw

More Information

⬅️ Previous capture (2021-12-04)

-=-=-=-=-=-=-

          RISK MANAGEMENT RESEARCH LABORATORY OVERVIEW


The National Institute of Standards and Technology (NIST) and the
National Computer Security Center (NCSC) have cooperatively
established a Risk Management Research Laboratory located at the NIST
facilities in Gaithersburg, MD.

The primary objective of the laboratory is to conduct research in risk
management techniques and methodologies.  As part of this endeavor,
risk management software products will be surveyed to determine their
applicability to different agency environments.  A demonstration
capability is also planned.  Although official product evaluations
will not be conducted, reports outlining the characteristics and
capabilities of products surveyed will be prepared.

An additional goal of the laboratory is to develop and publish
guidance on currently available risk management methods.  We plan to
develop a "standard" test case for use in the laboratory.  The test
case will provide a focal point for controlled analysis and
documentation.  It is further planned to develop data on computer
security incidents for estimating threat frequencies, vulnerabilities,
losses, direct and indirect impacts, etc.

A longer range goal of the laboratory is to develop and validate a
formal framework for analyzing, developing, and implementing risk
management methods.  We will be looking for methods of risk management
which could be economically employed across a broad spectrum of
computer environments and upon which standards could be based.  It is
intended that workshops will be organized to evaluate current and
future technology for this purpose.

Technical contributions and comments are welcome from interested
parties from both the public and private sectors.  The point of
contact for the laboratory is Irene Gilbert (NIST), 
(301) 975-3360.
                  Application Control Matrix

Methodology. Matrix approach. This methodology presents application
controls, control objectives, and risks in a mate format. The matrix
provides a summary of the security environment which allows the user
and auditor to quickly view where added safeguards are needed.  A data
base of controls from which to make selections is included in this
software package.

Hardware Requirements.

- IBM PC or compatible.
- Two diskette drives or one diskette drive and a fixed drive.

Operating System.

- MS-DOS Version 2.0 or later.

Laser Interface~ease of Use.

- Menu-driven.
- Online HELP facility.

Documentation and Training.

- User Manual.

Developer/Vendor. Nander Brown & Co., Reston, VA (202) 653-6646.
Remarks.
Government agencies may obtain copies of this software at no charge.
           BDSS (Bayesian Decision Support System).
Methodology.  Quantitative/Qualitative.  BDSS is programmed to gather
tangible and intangible asset valuation data and to ask questions that
assess potential risks using quantitative data bases provided by the
vendor.  The user can include site-specific threat experiences which
the algorithms will process along with the quantitative knowledge
base. Threats, vulnerabilities, asset categories, and selected
safeguards are automatically mapped and cross-mapped to each other. 
system ranks threats before and after the implementation of safeguards
so that the representation of comparable exposure to loss may be
examined. The analysis results are typically displayed graphically
with risk curves based on dollar loss values and probability of loss
coordinates. The central algorithms of BDSS are based on Bayes'
Theorem addressing uncertainty and statistical methods. BDSS software
produces a variety of printed reports as well as ASCII files that may
be exported to the user's word processor.  The vulnerability analysis
feature of the BDSS application also provides a stand-alone
qualitative presentation of safeguard system weaknesses.

Hardware requirements.

- IBM PC/AT or compatible.
- 640KB memory.
- 20MB fixed drive and one diskette drive.
- Graphics card (CGA/EGA)

Operating System.

- MS-DOS Version 3.0 or later.

User Interface/Ease of Use.

- Menu driven.

Documentation and Training:

- User manual.
- Training is not included with purchase but may be provided 
  upon request.

Developer/Vendor.  Ozier, Perry & Associates developed BDSS in a joint
venture with Pickard, Lowe and Garrick, Inc. of Newport Beach, CA and
Washington, DC. For further information regarding the software contact
Ozier, Perry & Associates, San Francisco, CA; (415) 989-9092

Remarks.                           BUDDY SYSTEM

Methodology. Qualitative. The Buddy System is an automated risk
analysis methodology for microcomputer environments and comprises two
components: (1) countermeasures survey and (2) security analysis and
management (SAM). This software package assesses the level of
vulnerability based on safeguards already in place. The level of
information being processed on the system determines whether or not
the assessed level of vulnerability is acceptable. Recommendations for
corrective action are provided for each vulnerability that falls
outside of the acceptable range through the use of on-line "what if'
scenarios.  A data base containing over 100 safeguards is included in
this software package. Further, the Risk Management component of the
system allows the analyst to track recommended corrective action
implementations for reports and/or follow-up procedures.

Hardware Requirements.

- IBM PC or compatible.
- 256KB memory.
- 10MB fixed drive and one 360K diskette drive.

Operating system.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- On-line HELP facility.

Documentation and Training.

- User manual.
- One-day on-site training course.
- Training component built into the software to increase security
  awareness.

Developer/Vendor: Countermeasures, Inc., Hollywood, MD; (301) 373-
5166.

Remarks.

- Optional Maintenance Utility allows the user to customize the
  software.
- Report and screen formats can be edited with standard DOS
  editor.
         CONTROL MATRIX METHODOLOGY FOR MICROCOMPUTERS

Methodology.  Matrix approach. This software provides a matrix
approach for designing controls into microcomputer system
environments.  It identifies which controls are necessary to ensure
adequate security in business or scientific systems.  The software
package contains four separate systems.

Package 1 (Designing Controls into Computerized Systems) is an
educational tool that teaches the user how to design and develop a
control matrix.

Package 2 (Risk Ranking the Matrix) teaches the use of Delphi and
Comparison Risk Ranking techniques to rank threats and their controls.

Package 3 (Automated PC-Based Control Matrix Design) is a control
matrix development package that contains a database of controls plus
separate databases of threats and computer system components. This
package allows one to draw a draft matrix, search the controls
database and move relevant controls to a matrix controls list.

Package 4 (Show Text Presentation Graphics) is used to draw the final
matrix resequencing threats, components, and controls.

Hardware Requirements.

- IBM PC or compatible or IBM Personal System/2.
- 384KB memory.
- Two diskette drives or 10MB fixed disk.
- Graphics capability.

Operating system.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- A demo diskette provides a ten minute introduction to the
  matrix concept of designing controls into computerized systems.

Documentation and Training.

- User manual.
- Automated course.
- One or two day on-site training upon request.

Developer/Vendor. Jerry Fitzgerald & Associates, Redwood City, CA
(415) 591-5676

Remarks.

     CRAMM (CCTA Risk Analysis and Management Methodology)

Methodology:  Qualitative.  CRAMM is a risk analysis tool developed by
the British government and BIS Applied Systems Limited.  CRAMM is
composed of three stages, each supported by questionnaires and
guidelines. The primary function of Stage 1 is the valuation of data
and physical assets of the system or network under review. Qualitative
values are determined for the data assets on a scale of 1 to 10, for
potential impacts of disclosure, modification, destruction, and
availability. The physical asset are valued on the basis of
replacement costs, which are also convened to scalar values of 1 to
10, with 10 representing the highest value. The review moves to stage
2 for those assets valued higher than 3. (Baseline protective measures
are recommended for assets valued lower than 3).

Stage 2 measures the levels of threats and vulnerabilities for each
asset group and then measures the risks on a scale of 1 to 5. In stage
3, these measures are used to select safeguards from a library of over
900.  CRAMM provides an iterative safeguard evaluation, in priority
sequence, to facilitate selection of the most appropriate safeguards.
A variety of reports are produced. CRAMM also provides a password
logon function. Sensitivity markings are provided on all screens and
hardcopy output.

Hardware Requirements.

- IBM PC or compatible.
- 640KB memory.
- 10MB fixed drive.

Operating System.

- MS-DOS 2.1 or later.

User Interface/Ease of Use.

- Menu-driven.
- On-line HELP facility.

Documentation and Training.

- User manual.
- Management guide.
- Training available upon request.

Developer/Vendor. BIS Applied Systems Limited, London SE1 9PN,
England; telephone 011-44-1-633-0866.

Remarks. CRAMM is available in the USA by licence agreement between
BIS and the UK Central Computer Telecommunications Agency. The BIS
Service Representative and provider of a US-based help desk and
support services is Executive Resources Associates, Inc., Suite 813,
One Crystal Drive, Arlington, VA 22202; (703) 920-5200.CRITI-CALC

Methodology: Quantitative/Qualitative. This product uses the concept
of annualized loss expectancy (ALE) to quantify the criticality of
risk exposure for applications. The software collects information
about each application's loss potential, optimum off-site recovery,
cost of backup, cost 10 recover.  It uses this information to
calculate each application's annualized risk potential. The
criticality of each application is determined by the potential for
loss caused by a processing interruption and a profile of up to 14
delay factors. The user interacts with the system by means of screens
which display information about the risk exposure.  Once the user has
reviewed the initial results, "what if" analysis may be performed by
modifying the input data as a way of verifying the effectiveness of
certain safeguards.  The information contained in the output reports
may be used to optimize contingency plans.  The ALE, as a function of
maximum outage duration, is compared with the corresponding cost of
backup data to identify automatically the optimum off-site recovery
site.

Hardware requirements:

- IBM PC/XT or compatible.
- 64OK memory.
- 360K diskette drive.
- Feed drive not necessary but convenient.

Operating SYstem:

- MS-DOS Version 2.11 or later.

User Interface ease of Use:

- Menu-driven.
- Help screen.

Documentation and Training:

- User manual with sample databases and detailed tutorial.
- On-site training.

Developer/Vendor: International Security Technology, Reston, VA (703)
471-0885.

Remarks.
                            GRA/SYS

Methodology.  Qualitative.  GRA/SYS is a tool designed to assist
internal auditors and security personnel in developing a work priority
plan for reviewing organizational risks. Specifically, the software
prepares an applications and computer activity inventory, determines
the number of risks for several major control areas. A risk score that
reflects the measure of risk to the organization is calculated and
placed in descending order on a scale of 1 to 9, with 9 representing a
worst-case situation.  An additional report that reflects the number
of times each risk occurs is also prepared. Using the output reports
from this software package, the user is able to identify those risks
where more effective safeguards are needed.

Hardware Requirements.

- IBM PC or compatible.
- 64KB memory.
- One diskette drive.

Software Requirements.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User manual.
- Training is not offered with the purchase.


Developer/Vendor.  Nander Brown & Co., Reston, VA.;
(202) 653-6646.

Remarks.

Government organizations may obtain this software at no cost.
   IST/RAMP (International Security Technology/Risk Analysis
                       Management Program)
                        
Methodology. Quantitative and Qualitative. 1ST/RAMP is a mainframe-
resident risk analysis program with an input module that is PC-
resident. The software calculates the annualized loss expectancy and
as well as single occurrence loss.  The system can also provide a
qualitative analysis.  1ST/RAMP generates data collection forms to
assist the risk analyst in organizing and controlling data collection.
Five loss categories are addressed: service interruptions; physical
loss and damage; fraud; unauthorized disclosure; and physical theft. A
library of data bases enables the analyst to maintain an audit trail
of input data changes. A 'what-if' capability enables the analyst to
select the most cost-effective security measures.

RAMP<->LINK~is a PC-resident, menu-driven data entry system which uses
risk information entered by the analyst to build a DOS file that can
be uploaded to IST/RAMP for processing.

Hardware Requirements.

- IBM Mainframe for IST/RAMP--30xx with MVS.
- Interactive under TSO and Roscoe.
- IBM PC/XT or compatible for RAMP<->Link.
- 5K12 memory.
- Two diskette drives or one diskette and fixed disk drives.

Software Requirements.

- MS DOS Version 2.1 or later.

User Interface/lEase of Use.

- Menu-driven.

Documentation and Training.

- Training manual with sample data bases and detailed tutorial.
- User manual.
- Three-day on-site training.
- Pocket reference.

Developer/Vendor International Security Technology, Reston, VA; (703)
471-0885.

Remarks.

RAMP<->L~ makes it unnecessary for the analyst to be familiar with the
details of 1ST/RAMP data entry formats.  The analyst enters the data
off-line and logs onto a mainframe where 1ST/RAMP is resident using
any communications software package that has a "file send" command.
                            JANBER
                           
Methodology:  Qualitative.  Janber initiates a yes/no questionnaire
and checklIst for collecting information about security controls
already in place. The software weights safeguards currently in place
and measures them against the level of data being processed on the
system. These data classification levels point to highly sensitive but
unclassified information to highly classified data. The analysis
provides a linguistic characterization of the level of vulnerability
from 2-28, with 28 representing a worst-case scenario.
Vulnerabilities, safeguards and their weights can be preestablished by
the vendor to meet the organization requirements. Safeguards that are
required but not implemented are flagged in a report and
recommendations for safeguards that meet organizational guidelines and
directives are provided. Users have the capability of performing
"what-if' scenarios to evaluate the effectiveness of certain
safeguards.

The Janber application allows users to define standard entries for
specific data fields.  The results of the data collection and analysis
are maintained on separate data bases. The developer recommends that
both the analysis and the data collection be performed by different
personnel to assure the integrity of the results.  The developer
further recommends that the analysis be performed by computer security
professionals to achieve optimum results.  The software provides a
capability to track action items resulting from the evaluation.

Janber creates a database of information on all systems surveyed and
provides a data base query capability for contingency planning and
recovery operations.

Hardware Requirements.

- IBM PC or compatible.
- 10MB Feed drive and one diskette drive.

Operating system.

- MS-DOS Version 2.0 or higher.

User Interface/Ease of Use.

- Menu-driven.
- On-line help facility.

Documentation and Training.

- User manual.
- Training provided upon request.

Developer/Vendor. Eagan, McAIlister Associates, Inc., Lexington Park,
MD 20653; (301) 862-3565.

Remarks.LAVA (Los Alamos Vulnerability and Risk Assessment)

Methodology:  Qualitative and Quantitative.  LAVA administers
questionnaires which results in the identification of missing
safeguards in 34 areas ranging from password management to personnel
security and internal audit practices.  The software evaluates
potential consequences and impact upon the organization and the
ultimate loss exposure (risks). LAVA considers three kinds of threats:
natural and environmental hazards; accidental and intentional on-site
human threats (including the authorized insider); and off-site human
threats. Detailed LAVA reports provide both qualitative and
quantitative results of the risks identified.

Hardware requirements.

- IBM PC- or compatible.
- 512KB memory.
- 360KB and 720KB diskette drives; or 1.2MB fixed drive and 
  one 360~ diskette drive.

Operating System.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Interactive questionnaires.

Documentation and Training.

- User manual.
- On-site training.
- Demonstration diskette.

Developer/Vendor.  Los AIamos National Laboratory, Los AIamos, NM;
(505) 667-7777.

Remarks.

The LAVA methodology stresses a team approach for conducting the risk
assessment.  It is recommended the team be composed of people with a
broad spectrum of backgrounds and expertise to ensure a thorough
assessment. It is further recommended that a consensus among the group
be reached before entering an answer to any of the questions, and that
in some cases this may be the most difficult part of administering
this risk management software.

Distribution of this package is handled through the National Security
Agency (contacts include Sam Samuelson (301)~688-6022; Ed Markel (301)
688-6022; or John LaPaille (301) 688-5331.
          LRAM (Livermore Risk Analysis Methodology)

Methodology: Quantitative. A government-developed system, this
methodology is structured to allow screening of asset/threat-event
combinations so that only high impact risks are reviewed. The
methodology focuses attention on the effectiveness of proposed
security controls as well as those already in place. LRAM is divided
into three major phases to include project planning, risk analysis,
and decision support. The initial phase defines the scope of the
analysis and identifies needed resources and personnel. The second
phase analyzes the data collected from phase 1.  In this second phase,
risk elements are identified by establishing corresponding threats,
control and asset components, the results of which are provided as
input for the final decision support phase.

The final decision support phase is meant to assist in the security
management of information. It is a process to select and list in
priority order each recommended safeguard on the basis of cost benefit
estimates and other decision indexes.

Hardware Requirements.

- IBM PC or compatible.
- 640K memory.
- One diskette drive and fixed drive.

Operating SYstem.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User manual.


Developer/Vendor~ Lawrence Livermore National Laboratory, Livermore,
CA; (415) 423-3083 or 543-3082.

Remarks.
                         MARION

Methodology.  Qualitative/Quantitative. LION assesses business risks
associated with information systems drawing on a large database of
actual incidents. The software incorporates a questionnaire to
evaluate the level of security that is currently being applied within
the organization. Each question is allocated a weighting which
reflects the relative importance according to the analysis of the
underlying database of events. A score is allocated for each question;
the responses and scores are stored. The software calculates the
overall score for 27 categories of security and presents the results
graphically and in printed form.  Once the current security profile
has been determined, MARION compares each category with industry norms
which are derived from the database. The software uses the information
on costs also held iii the database to calculate an estimated
expenditure in relation to the total security budget. The calculated
costs are analyzed according to the nature of the security category
and presented graphically in detailed tables.  A "what-if" capability
allows one to use different budgets to determine the effects on the
security profile. The effects of the proposed measures can also be
displayed.

Hardware Requirements.

- IBM PC or compatible.
- 5l2K memory.
- Graphics capability.

Operating System.

- MS DOS 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User Manual.

Developer/Vendor.  Coopers & Lybrand (United Kingdom firm), Plumtree
Court, London EC4A 4HT, telephone 01-822-4678.

Remarks.

MARION is a methodology developed in France. Coopers & Lybrand are the
agents for the package in the UK.  They have worked with a French
software house PSI to produce an English version of the package and
supporting reference material.

                  MicroSecure Self Assessment

Methodology. Qualitative. An automated software tool that will allow
PC users to conduct a security self-assessment.  The software analyzes
the PC environment, determines the vulnerabilities, and recommends
security controls.  Those safeguards recommended are designed to
increase security and reduce exposures in six areas to include system
integrity, data security, credibility, data integrity, backup and
disaster recovery, and confidentiality and privacy.  The software may
be customized to meet specific requirements.

Hardware Requirements.

- IBM PC or compatible.
- 256K memory.
- One diskette drive.

Operating System.

- MS DOS 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User Guide.
- On-line tutorial.

Developer/Vendor Boden Associates, East Williston, NY;
(516) 294-2648.

Remarks.  An optional question quiz is provided at the end of each
chapter of the training course. Recommendations for corrective action
can be printed directly to the printer or written to an ASCII text
file for editing.
                           MINIRISK

Methodology. Qualitative. MINIRISK is a tool designed to assess
computer security vulnerabilities in a micro computer environment.  A
vulnerability assessment questionnaire allows the organization to
evaluate the adequacy and completeness of individual safeguards areas
and to reevaluate these same areas after missing safeguards have been
implemented. During the process of answering the MINIRlSK
questionnaire, the user identifies missing safeguards in 10 to 50
vulnerability categories ranging from password management to
contingency planning and internal audit controls.  Safeguards and
controls considered mandatory by the organization have been appointed
for each category that is to be reviewed. The absence of certain
safeguards determines the level of vulnerability on a scale of zero to
9, with zero being the best case, and 9 the worst.  MINIRISK
establishes a threshold by which to evaluate vulnerabilities that
exceed an acceptable risk level.


Hardware Requirements.

- IBM PC or compatible.
- 64KB memory.
- One diskette drive.

Software Requirements.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.
- Online HELP facility.
- User defined questionnaire.

Documentation and Training.

- User manual.
- Training is not offered with the purchase.

Developer/Vendor.  Nander Brown & Co., Reston, VA.; (703) 689-4580.

Remarks.  Government organizations may obtain this software at no
cost.
    PRISM Risk Analysis and Simulation for the PC

Methodology. Qualitative. Prism supports development of risk analysis
modelling, simulation, sensitivity analysis, and graphical
presentation of results. It also contains system functions to save,
retrieve, display, and modify existing models. In addition to simple
algebraic equations, Prism permits use of BASIC-like statements to
model more complex applications.

Hardware Requirements.

- IBM PC or compatible.
- 512K fixed drive.

Operating System.

- MS-DOS 2.0 or later.

User Interface/lEase of Use.

- On-line HELP facility.

Documentation and Training.

- User manual.
- Training and on-site seminars.
- Consulting services available to assist in model development.

Developer/Vendor. Palisade Corporation, Newfield, NY;
(607) 564-9993.

Remarks.
                           QUICKRISK

Methodology:  Qualitative.  Quikrisk requires the user to input
information about the systems and facilities on a scenario form. These
forms pertain to potential threats, current safeguards, and assets.
Once all of the input information has been entered, the software
computes the results which provide an annual loss exposure. An
additional computation is performed which displays a return on
investment for each control in place.  The analyst also has the
capability of modifying the results of previous computations by
modifying the input data.  In addition, the software is delivered with
a threat file containing numerous threats and frequencies. The user
has the capability of adding threats to this list.


Hardware requirements.

- IBM PC or compatible.
- Two diskette drives.

Operating System.

- MS-DOS Version 2.0 or later.

User Interface~se of Use.

- Menu-driven.

Documentation and Training.

- User manual.

Developer/Vendor Basic Data Systems, Rockville, MD;
(301) 269-2691.

Remarks.
                     RANK-IT
Methodology. RANK-IT is a risk assessment software package that uses
the Delphi technique. Delphi is an expert system approach to risk
ranking. This software automates the Delphi technique by adding
Comparison Risk Ranking to obtain an ordinally ranked list of the
items being ranked or to calculate percentage risk values.  Each
ranked item has a numerical value that can be used as a weighting
factor or a cardinal number value.

RANK-IT is used to risk rank system threats, controls,
vulnerabilities, components, or any other criteria. It also can be
used to rank other types of business decision alternatives, whether
quantifiable or not.

The developer suggests that the time required to conduct a risk
ranking using this combined Delphi and Comparison Risk Ranking
methodology can range from 30 minutes to three hours.

Hardware Requirements.

- IBM PC/XT/AT or compatible or IBM Personal System/2.
- 5l2KB memory.
- Single diskette drive or fixed disk (300K memory required).
- Graphics capability.

Operating System.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- Demonstration diskette.
- User manual.
- Tutorial and training diskettes.
- One-day on-site training upon request.

Developer/Vendor.  Jerry Fitzgerald & Associates, Redwood City, CA;
(415) 591-5676.

Remarks.
                 Risk Analysis System (RA/SYS)

Methodology.  Quantitative. RA/SYS is an automated risk analysis
system which processes with a series of interconnected files that can
assess up to 50 vulnerabilities and assets and 65 threats.
Calculations are performed on threat/vulnerability pairs to produce
threat ratings and threat frequencies. A report summarizes loss
estimates, cost benefit analysis, and return on investment.

Hardware Requirements.

- IBM PC or compatible.
- 128KB of memory.
- Two 360KB diskette drives or 640KB fixed drive.

Operating System.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.
- On-line HELP facility.

Documentation and Training.

- User manual.
- Technical assistance available upon request.

Developer/Vendor Nander Brown & Co., Reston, VA;
(202) 689-4580.

Remarks.

Government agencies may obtain copies of this software at no charge.
                          RiskCALC

Methodology.  Quantitative or Qualitative.  An annual loss expectancy
(ALE) or other metric is computed based on an answered questionnaire. 
The user may optionally change the values of RiskCALC variables to
determine the most cost-effective safeguards and display the results
on the user's screen. RiskCALC is part of a 'family' of software tools
described below. They each provide a standard ASClI file interface for
exporting and importing RiskCALC variables.

      o  RiskCALC allows the user to answer questions and print
reports into which values elicited from the questionnaire are
automatically inserted.

      o Risk Minimizer identifies an organization's most
significant risks from a completed analysis. Risk Minimizer may be
used with other risk management software tools that use the RiskCalc
file format.

      0  The System Manager assists in designing or customizing an
existing risk analysis model.

      o  The Demonstration Models allow the user to develop a
site-speciiic questionnaire or select one that models several risk
scenarios.

Hardware requirements.

- IBM PC or compatible.
- 5I2KB memory.
- Fixed drive is optional but recommended.

Operating system.

 MS-DOS Version 2.1 or later.

User Interface/Ease of Use.

- Menu driven.
- On-line help facility.
- Lotus-like iriterface.

Documentation and Training.

- User and system administrator manuals.
- One day on-site training with purchase.
- A three-day course on computer security and risk management 
  is available upon request.

Developer/Vendor.  Hoffman Business Associates, Inc., Chevy Chase,
MD., (301) 656-6205.

Remarks
                            RISKPAC

Methodology.  Qualitative.  This software product is composed of three
components--questionnaire, surveys, and reports. The results of the
questionnaire are stored in a 'survey' which provides the basis of the
analysis.  The questions point to discrete categories that provide a
review of an organization's policies, physical environment, processing
hardware and the applications and data which make up a system.  Each
of these categories are evaluated separately. A variety of
questionnaires that apply to several disciplines (e.g., manufacturing,
banking, and government) are available.  'Reports' provide the results
of the evaluation expressed on a scale of one to five, with five
representing a worst-case scenario. The weighting and scoring
algorithms are based on Kepner/Tregoe type of analysis. The package
can produce data files that can be input to various database spread
sheets.  Further, the software is equipped with a number of utility
routines that allow organizations to develop their own questionnaires.
This 'System Manager' capability is available separately.

Hardware Requirements.

- IBM PC, PC/XT, or PC/AT or compatible.
  256K ofmemory.
- Two diskette drives or 10MB fixed drive.

Operating system.

- MS-DOS Version 2.0 or later.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User manual.
- Training provided upon request.

Developer/Vendor:  Computer Security Consultants, Ridgefield, CT,
Subsidiary of Computer Security Consultants, LTD.; (203) 431-8720.

Remarks.
                             RISKWATCH

Methodology.  Qualitative/Quantitative.  The RISKWATCH software is
capable of analyzing organizations, facilities, systems, applications
and networks, both large and small.  RiskWatch distinguishes between
financial, critical, sensitive and classified systems. The system
access relational data bases that contain over thousands of
relationships between threats, assets, vulnerabilities, losses, and
safeguards. Responses to a questionnaire which addresses a wide
variety of job functions is combined with the databases to produce a
comprehensive risk analysis report. This report also provides an asset
inventory, a detailed list of vulnerabilities, threat analysis with
annual loss expectancies and recommended safeguards that include
return-on-investment. The system provides a query capability for any
selected threat, asset, vulnerability or safeguard.

Hardware requirements.

- IBM-XT/AT or compatible.
- 640K memory.
- 10MB fixed drive.
- Graphics.
- Color monitor.

Operating system.

- MS DOS Version 2.1 or higher.

User Interface/Ease of Use.

- Menu-driven.

Documentation and Training.

- User manual.
- Training provided upon request.

Developer/Vendor. Expert Systems Software, Inc., Long Beach, CA
(213) 499-3346.

Remarks.

The software can be customized to meet the needs of both defense and
civil organizations.  LOGICON is authorized to distribute this
software package, Arlington, VA (703) 486-3500.


Downloaded From P-80 International Information Systems 304-744-2253