Anonymous ID: 083b94 June 5, 2023, 4:12 p.m. No.18958012   🗄️.is đź”—kun

Good Grief It's Ora

 

network delouser or dirtbag detection system?

 

Try it and see.

 

ORA

 

Abstract

 

ORA is a network analysis tool that detects risks or vulnerabilities of an organization’s design structure.

 

The design structure of an organization is the relationship among its personnel, knowledge, resources, and tasks entities. These entities and relationships are represented by the Meta-Matrix. Measures that take as input a Meta-Matrix are used to analyze the structural properties of an organization for potential risk.

 

ORA contains over 100 measures which are categorized by which type of risk they detect.

Measures are also organized by input requirements and by output. ORA generates formatted reports viewable on screen

or in log files, and reads and writes networks in multiple data formats to be interoperable with existing network analysis packages. In addition, it has tools for graphically visualizing Meta-Matrix data and for optimizing a network’s design structure. ORA uses a Java interface for ease of use, and a C++ computational backend. The current version ORA1.2 software is available on the CASOS website:

 

http://www.casos.ece.cmu.edu/projects/ORA/index.html

 

http://reports-archive.adm.cs.cmu.edu/anon/isr2012/CMU-ISR-12-105.pdf

Anonymous ID: 083b94 June 5, 2023, 4:20 p.m. No.18958054   🗄️.is đź”—kun   >>8073

''' Rapid Mission Assurance Assessment via

Sociotechnical Modeling and Simulation'''

 

Michael Jay Lanham

 

How do organizations rapidly assess command-level effects of cyber attacks?

 

Leaders need a way of assuring themselves that their organization, people, and information technology can continue their missions in a contested cyber environment. To do this, leaders should: 1) require assessments be more than analogical, anecdotal or simplistic snapshots in time; 2) demand the ability to rapidly model their organizations; 3) identify their organization's structural vulnerabilities; and 4) have the ability to forecast mission assurance scenarios. Using text mining to build agent based dynamic network models of

information processing organizations, I examine impacts of contested cyber environments on three common focus areas of information assurance confidentiality, integrity, and availability. I find that assessing impacts of cyber attacks is a nuanced affair dependent on the nature of the attack, the nature of the organization and its missions, and the nature of the measurements. For well-manned information processing organizations, many attacks are in the nuisance range and that only multipronged or severe attacks cause meaningful failure. I also find that such organizations can design for resiliency and provide guidelines in how to do so.

 

https://apps.dtic.mil/sti/pdfs/ADA624647.pdf