Can you check link and repost
not page for anon
>
http://sysarch.gmu.edu/main/media/publications/docs/228P.pdf
Can you check link and repost
not page for anon
>
http://sysarch.gmu.edu/main/media/publications/docs/228P.pdf
Good Grief It's Ora
network delouser or dirtbag detection system?
Try it and see.
ORA
Abstract
ORA is a network analysis tool that detects risks or vulnerabilities of an organization’s design structure.
The design structure of an organization is the relationship among its personnel, knowledge, resources, and tasks entities. These entities and relationships are represented by the Meta-Matrix. Measures that take as input a Meta-Matrix are used to analyze the structural properties of an organization for potential risk.
ORA contains over 100 measures which are categorized by which type of risk they detect.
Measures are also organized by input requirements and by output. ORA generates formatted reports viewable on screen
or in log files, and reads and writes networks in multiple data formats to be interoperable with existing network analysis packages. In addition, it has tools for graphically visualizing Meta-Matrix data and for optimizing a network’s design structure. ORA uses a Java interface for ease of use, and a C++ computational backend. The current version ORA1.2 software is available on the CASOS website:
http://www.casos.ece.cmu.edu/projects/ORA/index.html
http://reports-archive.adm.cs.cmu.edu/anon/isr2012/CMU-ISR-12-105.pdf
''' Rapid Mission Assurance Assessment via
Sociotechnical Modeling and Simulation'''
Michael Jay Lanham
How do organizations rapidly assess command-level effects of cyber attacks?
Leaders need a way of assuring themselves that their organization, people, and information technology can continue their missions in a contested cyber environment. To do this, leaders should: 1) require assessments be more than analogical, anecdotal or simplistic snapshots in time; 2) demand the ability to rapidly model their organizations; 3) identify their organization's structural vulnerabilities; and 4) have the ability to forecast mission assurance scenarios. Using text mining to build agent based dynamic network models of
information processing organizations, I examine impacts of contested cyber environments on three common focus areas of information assurance confidentiality, integrity, and availability. I find that assessing impacts of cyber attacks is a nuanced affair dependent on the nature of the attack, the nature of the organization and its missions, and the nature of the measurements. For well-manned information processing organizations, many attacks are in the nuisance range and that only multipronged or severe attacks cause meaningful failure. I also find that such organizations can design for resiliency and provide guidelines in how to do so.
https://apps.dtic.mil/sti/pdfs/ADA624647.pdf
notable
Army Medic gets a bad conduct discharge for refusing to serve under UN command. Press Y if you think he's Marine material.
notable
with sauce
https://twitter.com/LeadingReport/status/1665333181732605955?s=20