Documente Academic
Documente Profesional
Documente Cultură
The steps taken by the federal government are just starting points, and In the presentation, Richmann identified 19 potential metrics for agencies
much work is yet to be done to improve the security of IT systems, data to use, but cautioned that agencies must
and critical infrastructure. Jim Richmann, Study Director of Cybersecurity tailor their metrics to meet their needs. The examples he presented were:
Research, Institute of Defense Analyses, recently spoke during a 1. Percentage of source traffic covered by foundational cyber defense
GovLoop webinar, Combating the Cyber Landscape. Richmann’s assets in DMZs
presentation focused on how agencies can establish cyber metrics to 2. Currency of enterprise virus signatures
improve security strategies. Prior to identifying potential metrics for 3. Percentage of client systems that have current enterprise virus
agencies to adopt, Richmann provided an overview of the foundational signatures
elements needed to create metrics at an agency. Four areas he focused 4. Percentage of desktops with automated patching
on were:. 5. Percentage of desktops with automated integrity checking
6. Volume of traffic blocked at border router (segmented by type)
Foundational Elements Needed to Create Metrics 7. Blocked port scan volume at border router
8. Currency of firmware patches for foundational cyber defense assets
Understand Your Cybersecurity Foundation: This foundation 9. Known zero day export exposure (publicly known)
includes hardware and software assets, including, routers, switches, 10. Uptime and availability for assets
physical point-to-point circuits, SANs, management tools, satellite links 11. Number of cyber attacks that are detected: Viruses, spam, phishing
and wireless hubs. attacks, etc.
Know Your Dedicated Defense Assets: These assets are designed 12. Assets not patched to current standard
only to provide cyber defense. These elements include enterprise virus 13. Firmware not updated to enterprise standards
scanning software, intrusion detection systems, firewalls and PKI. 14. Assets failing integrity check
Identify Your Unique Cyberspace Assets: 15. Non-standard software installations detected
These assets exist only in cyberspace. Some examples include end-user 16. Known zero-day exploit exposure (publicly known)
hardware clients, application servers, web servers, mobile devices, web 17. Currency of required administrator training
servers, ERP systems, printers, scanners and application software. 18. Vulnerability scan statistics
Assets that Leverage Cyberspace: These assets utilize cyberspace, 19. Source code scan results (where available and applicable)
but their primary existence and function is in other domains. Some
Cybersecurity is only effective when agencies can baseline and measure
examples include weapons systems, related platforms, support systems
success. In order to do so, agencies must place an emphasis on defining
and infrastructure.
metrics that fit organizational need, and work diligently to identify risks,
assess vulnerabilities and create a robust set of metrics to measure
success.