# Cyber-Risk Informatics: Engineering Evaluation with Data Science

# Cyber-Risk Informatics: Engineering Evaluation with Data Science

ISBN: 978-1-119-08753-3

May 2016

560 pages

$104.99

## Description

**This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.**

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book’s specifically preserved website will enable readers to utilize the course related problems.

• Enables the reader to use the book's website's applications to implement and see results, and use them making ‘budgetary’ sense

• Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds

• Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author

*Cyber-Risk Informatics *is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling.

**Mehmet Sahinoglu,** a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University’s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of *Trustworthy Computing* (Wiley, 2007).

## Related Resources

### Instructor

Request an Evaluation Copy for this title

### Student

Prologue xiv

Reviews xv

Preface xxi

Acknowledgments and Dedication xxix

About the Author xxxi

**1 Metrics, Statistical Quality Control, and Basic Reliability in Cyber-Risk 1**

1.1 Deterministic and Stochastic Cyber-Risk Metrics 1

1.2 Statistical Risk Analysis 2

1.2.1 Introduction to Statistical Hypotheses 2

1.2.2 Decision Rules 3

1.2.3 One-Tailed Tests 4

1.2.4 Two-Tailed Tests 4

1.2.5 Decision Errors 6

1.2.6 Applications to One-Tailed Tests Associated with Both Type I and Type II Errors 7

1.2.7 Applications to Two-Tailed Tests (Normal Distribution Assumption) 11

1.3 Acceptance Sampling in Quality Control 16

1.3.1 Introduction 16

1.3.2 Definition of an Acceptance Sampling Plan 16

1.3.3 The OC Curve 16

1.4 Poisson and Normal Approximation to Binomial in Quality Control 19

1.4.1 Approximations to Binomial Distribution 19

1.4.2 Approximation of Binomial to Poisson Distribution 19

1.4.3 Approximation to Normal Distribution 20

1.4.4 Comparisons of Normal and Poisson Approximations to the Binomial 21

1.5 Basic Statistical Reliability Concepts and Mc Simulators 21

1.5.1 Fundamental Equations for Reliability, Hazard, and Statistical Notions 23

1.5.2 Fundamentals for Reliability Block Diagramming and Redundancy 27

1.5.3 Solving Basic Reliability Questions by Using Student-Friendly Pedagogical Examples 30

1.5.4 MC Simulators for Commonly Used Distributions in Reliability 47

1.6 Discussions and Conclusion 52

1.7 Exercises 52

References 60

**2 Complex Network Reliability Evaluation and Estimation in Cyber-Risk 61**

2.1 Introduction 61

2.2 Overlap Technique to Calculate Complex Network Reliability 62

2.2.1 Network State Enumeration and Example 1 63

2.2.2 Generating Minimal Paths and Example 2 64

2.2.3 Overlap Method Algorithmic Rules and Example 3 68

2.3 The Overlap Method: Monte Carlo and Discrete Event Simulation 70

2.4 Multistate System Reliability Evaluation 71

2.4.1 Simple Series System with Single Derated States 73

2.4.2 Active Parallel System 73

2.4.3 Simple Series–Parallel System 74

2.4.4 A Simple Series–Parallel System with Multistate Components 75

2.4.5 A Combined System: Power Plant Example 76

2.4.6 Large Network Examples Using Multistate Overlap Technique 77

2.5 Weibull Time Distributed Reliability Evaluation 78

2.5.1 Motivation behind Weibull Probability Modeling 78

2.5.2 Weibull Parameter Estimation Methodology 79

2.5.3 Overlap Algorithm Applied to Weibull Distributed Components 80

2.5.4 Estimating Weibull Parameters 80

2.5.5 Fifty-Two-Node Weibull Example for Estimating Weibull Parameters 85

2.5.6 A Weibull Network Example from an Oil Rig System 90

2.6 Discussions and Conclusion 90

Appendix 2.A Overlap Algorithm and Example 93

2.A.1 Algorithm 93

2.A.2 Example 95

2.7 Exercises 101

References 103

**3 Stopping Rules for Reliability and Security Tests in Cyber-Risk 105**

3.1 Introduction 105

3.2 Methods 107

3.2.1 Lgm by Verhulst 108

3.2.2 Compound Poisson Model 110

3.3 Examples Merging Both Stopping Rules: Lgm and Cpm 114

3.3.1 The DR5 Data Set Example 114

3.3.2 The Dr4 Data Set Example 118

3.3.3 The Supercomputing Cloud Historical Failure Data—Case Study 119

3.3.4 Appendix for Section 3.3 121

3.4 Stopping Rule for Testing in the Time Domain 131

3.4.1 Review of Compound Poisson Process and Stopping Rule 131

3.4.2 Empirical Bayes Analysis for the Poisson^Geometric Stopping Rule 132

3.4.3 Howden’s Model for Stopping Rule 135

3.4.4 Computational Example for Stopping-Rule Algorithm in Time Domain 136

3.5 Discussions and Conclusion 139

3.6 Exercises 143

References 144

**4 Security Assessment and Management in Cyber-Risk 147**

4.1 Introduction 147

4.1.1 What Other Scoring Methods Are Available? 148

4.2 Security Meter (Sm) Model Design 152

4.3 Verification of the Probabilistic Security Meter (Sm) Method by Monte Carlo Simulation and Math-Statistical Triple-Product Rule 154

4.3.1 The Triple-Product Rule of Uniforms 156

4.3.2 Data Analysis on the Total Residual Risk of the Security Meter Design 158

4.3.3 Triple-Product Rule Discussions 169

4.4 Modifying the SM Quantitative Model for Categorical, Hybrid, and Nondisjoint Data 170

4.5 Maintenance Priority Determination for 3 × 3 × 2 Sm 178

4.6 Privacy Meter (PM): How to Quantify Privacy Breach 183

4.6.1 Methodology 184

4.6.2 Privacy Risk-Meter Assessment and Management Examples 185

4.7 Polish Decoding (Decompression) Algorithm 187

4.8 Discussions and Conclusion 189

4.9 Exercises 190

References 199

**5 Game-Theoretic Computing in Cyber-Risk 201**

5.1 Historical Perspective to Game Theory’s Origins 201

5.2 Applications of Game Theory to Cyber-Security Risk 203

5.3 Intuitive Background: Concepts, Definitions, and Nomenclature 204

5.3.1 A Price War Example 205

5.4 Random Selection for Nash Mixed Strategy 208

5.4.1 Random Probabilistic Selection 208

5.4.2 Does Nash Equilibrium (NE) Exist for the Company A/B Problem in Table 5.1? 209

5.4.3 An Example: Matching Pennies 210

5.4.4 Another Game: The Prisoner’s Dilemma 210

5.4.5 Games with Multiple NE (Terrorist Game: Bold Strategy Result in Domination) 211

5.5 Adversarial Risk Analysis Models by Banks, Rios, and Rios 213

5.6 An Alternative Model: Sahinoglu’s Security Meter for Neumann and Nash Mixed Strategy 215

5.7 Other Interdisciplinary Applications of Risk Meters 220

5.8 Mixed Strategy for Risk Assessment and Management-University Server and Social Network Examples 221

5.8.1 University Server’s Security Risk-Meter Example 221

5.8.2 Social Networks’ Privacy and Security Risk-Meter (RM) Example 222

5.8.3 Clarification of Risk Assessment and Management Algorithm for Social Networks 224

5.9 Application to Hospital Healthcare Service Risk 226

5.10 Application to Environmetrics and Ecology Risk 229

5.11 Application to Digital Forensics Security Risk 234

5.12 Application to Business Contracting Risk 239

5.13 Application to National Cybersecurity Risk 245

5.14 Application to Airport Service Quality Risk 253

5.15 Application to Offshore Oil-Drilling Spill and Security Risk 257

5.16 Discussions and Conclusion 264

5.17 Exercises 266

References 271

**6 Modeling and Simulation in Cyber-Risk 277**

6.1 Introduction and a Brief History to Simulation 277

6.2 Generic Theory: Case Studies on Goodness of Fit for Uniform Numbers 278

6.3 Why Crucial to Manufacturing and Cyber Defense 279

6.4 A Cross Section of Modeling and Simulation in Manufacturing Industry 280

6.4.1 Modeling and Simulation of Multistate Production Units and Systems in Manufacturing 281

6.4.2 Two-State SL Probability Model of Units with Closed-Form Solution 283

6.4.3 Extended Three-State SL Probability Model of Up–Down –Derated Units with Mc Simulation 284

6.4.4 Statistical Simulation of Three-State Units to Estimate the Density of Up–Down –Der 289

6.4.5 How to Generate Random Numbers from Sl pdf to Simulate Component and System Behavior 296

6.4.6 Example of Sl Simulation for Modeling Network of 2-in-Simple-Series Two-State (Up–Dn) Units 297

6.4.7 Example of Sl Simulation for Modeling a Network of 7-in-Complex-Topology Two-State (Up–Dn) Units 300

6.5 A Review of Modeling and Simulation in Cyber-Security 301

6.5.1 MC Value-at-Risk Approach by Kim et al. in Cloud Computing 301

6.5.2 MC and DES in Security Meter (Sm) Risk Model 302

6.6 Application of Queuing Theory and Multichannel Simulation to Cyber-Security 306

6.6.1 Example 1: One Recovery-Crew Case for Cyber-Security Queuing Simulation 306

6.6.2 Example 2: Two Recovery-Crew Case for Cyber-Security Queuing Simulation 308

6.7 Discussions and Conclusion 308

Appendix 6.A 311

6.8 Exercises 315

References 335

**7 Cloud Computing in Cyber-Risk 339**

7.1 Introduction and Motivation 339

7.2 Cloud Computing Risk Assessment 342

7.3 Motivation and Methodology 343

7.3.1 History of Theoretical Developments on CLOUD Modeling 343

7.3.2 Notation 344

7.3.3 Objectives 344

7.3.4 Frequency and Duration Method for the Loss of Load or Service 345

7.3.5 Nbd as a Compound Poisson Model 346

7.3.6 Nbd for the Loss of Load or Loss of Cloud Service Expected 348

7.4 Various Applications to Cyber Systems 349

7.4.1 Small Sample Experimental Systems 349

7.4.2 Large Cyber Systems 353

7.5 Large Cyber Systems Using Statistical Methods 357

7.6 Repair Crew and Product Reserve Planning to Manage Risk Cost Effectively Using Cyberrisksolver Cloud Management Java Tool 359

7.6.1 Cloud Resource Management Planning for Employment of Repair Crews 360

7.6.2 Cloud Resource Management Planning by Production Deployment 365

7.7 Remarks for “Physical Cloud” Employing Physical Products (Servers, Generators, Communication Towers, Etc.) 368

7.8 Applications to “Social (Human Resources) Cloud” 372

7.8.1 Numerical Example for Social Cloud (200 Employees Performing) 376

7.8.2 Input Wizard Example for Social Cloud (200 Employees Performing) 379

7.9 Stochastic Cloud System Simulation 379

7.9.1 Introduction and Methodology 381

7.9.2 Numerical Applications for Ss to Verify Non-Ss 385

7.9.3 Details of Probability Distributions Used in Stochastic Simulation 387

7.9.4 Varying Product Repair and Failure Date with Empirical Bayesian Posterior Gamma Approach 393

7.9.5 Varying Link Repair and Failure Using Gamma Distribution 393

7.9.6 Ss Applied to a Power or Cyber Grid 394

7.9.7 Error Checking or Flagging 396

7.10 Cloud Risk Meter Analysis 397

7.10.1 Risk Assessment and Management Clarifications for Figures 7.72 and 7.73 402

7.11 Discussions and Conclusion 405

7.12 Exercises 407

References 416

**8 Software Reliability Modeling and Metrics in Cyber-Risk 421**

8.1 Introduction, Motivation, and Methodology 421

8.2 History and Classification of Software Reliability Models 422

8.2.1 Time-between-Failures Models 422

8.2.2 Failure-Counting Models 422

8.2.3 Bayesian Model 423

8.2.4 Static (Nondynamic) Models 423

8.2.5 Others 424

8.3 Software Reliability Models in Time Domain 424

8.4 Software Reliability Growth Models 425

8.4.1 Negative Exponential Class of Failure Times 425

8.4.2 J–M De-eutrophication Model (Binomial Type) 425

8.4.3 Moranda’s Geometric Model (Poisson Type) 426

8.4.4 Goel–Okumoto Nonhomogeneous Poisson Process (Poisson Type) 427

8.4.5 Musa’s Basic Execution Time Model (Poisson Type) 428

8.4.6 Musa–Okumoto Logarithmic Poisson Execution Time Model (Poisson Type) 429

8.4.7 L–V Bayesian Model 431

8.4.8 Sahinoglu’s Compound Poisson^Geometric and Poisson^Logarithmic Series Models 433

8.4.9 Gamma, Weibull, and Other Classes of Failure Times 435

8.4.10 Duane Model (Poisson Type) 439

8.5 Numerical Examples Using Pedagogues 440

8.5.1 Example 1 440

8.5.2 Example 2 441

8.6 Recent Trends in Software Reliability 441

8.7 Discussions and Conclusion 442

8.8 Exercises 444

References 445

**9 Metrics for Software Reliability Failure-Count Models in Cyber-Risk 451**

9.1 Introduction and Methodology on Failure-Count Estimation in Software Reliability 451

9.1.1 Statistical Estimation Models, Computational Formulas, and Examples 452

9.1.2 Interpretations of Numerical Examples and Discussions 464

9.2 Predictive Accuracy to Compare Failure-Count Models 466

9.2.1 Classical Distribution Approach 468

9.2.2 Prior Distribution Approach 469

9.2.3 Applications to Data Sets and Comparisons 472

9.3 Discussions and Conclusion 473

appendix 9.A 477

9.4 Exercises 478

References 482

**10 Practical Hands-On Lab Topics in Cyber-Risk 483**

10.1 System Hardening 483

10.1.1 General 483

10.1.2 Windows Servers 484

10.1.3 Wireless 484

10.1.4 Firewalls, Routers, and Switches 485

10.2 Email Security 486

10.2.1 Identifying Fake Emails 486

10.2.2 Emotion Responses 486

10.3 MS-DOS Commands 487

10.3.1 Mapping Intel 488

10.4 Logging 492

10.4.1 Policy 493

10.4.2 Understanding Logs 494

10.5 Firewall 495

10.5.1 Traditional Firewalls 495

10.5.2 Ngfs 496

10.5.3 Host-Based Firewalls 496

10.6 Wireless Networks 496

10.7 Discussions and Conclusion 499

Appendix 10.A 500

10.8 Exercises 501

10.8.1 System Hardening 501

10.8.2 Email 501

10.8.3 Ms-Dos 502

10.8.4 Logging 503

10.8.5 Firewall 503

10.8.6 Wireless 505

10.8.7 Comprehensive Exercises 505

10.8.8 Cryptology Projects 507

References 509

What the Cyber-Risk Informatics Textbook and the Author are About? 511

Index 513