22
An integrated cyber-security strategy

A system approach to cyber security

Embed Size (px)

DESCRIPTION

Looking at cyber security from the whole rather than focusing on parts.

Citation preview

Page 1: A system approach to cyber security

An integrated cyber-security strategy

Page 2: A system approach to cyber security

Person Centered New Security and Resilience

Person New

0-5 X

K-5 0

6-8 0 x

9-12 0 x

13-16 0 x

Workforce 0 x

Seniors X

Adopting NIEM ◦ Using Pattern Language

Intimacy Gradient

◦ Personal Cloud

TMN Server – Linux

Resilience ◦ Crisis

Violence

Prevent

Respond

Monitor

CDD

DHS

IRS

CFP

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

Expected =x

Optional = 0

0x=can be tailored to include experience based project learning

Page 3: A system approach to cyber security

Any Disabled

Any Unemployed

Proven Models ◦ Reviewed or recommended based on whether other counties have the same service

organization.

◦ Reviewed based on ability to adopt the same cloud service model.

◦ Based on flexibility in local decisions.

Benefits 0-5 years K-5 6-8 9-12 13-16

Workforce Seniors

One Record Personal Cloud

Prelude – Team Career

X X X X X X X

Safe Child Care - CPR X X X

Taxes – linked to childcare X X X X

Early Detection-certification X

Violence Detection X X X X

Food Program X X X

Cultural Cooking at Senior

centers

X X

Copyright @2013 Wicked Design Solutions

Lisa Martinez 408-638-9016

0-5

years

Over

65 Any

Veteran

Page 4: A system approach to cyber security

New Skill - Capability Person Benefits Internet Hosting Access

New Personal Cloud Person back in control

with federal access

oversight

Linux server

Clients in an open

source

NIEM reference

architecture

Pattern Language Security

via ACL to a dedicated IGL

Authorize and confirm

services billed

Access Control Link

to a secure storage

NEIM Policy &

Roles Based

Service Provider (Last

Mile) Carrier

Zero down time,

dedicated connections

Online Provisioning NIEM Policy &

Roles Based

Parent Child Pages Parental Control New Personal Cloud NIEM reference

architecture

Linux Server with clients Each TMN site results in

the package

Requires permanent

domain

NIEM

Reference

Architecture

Page 5: A system approach to cyber security

in 2004, entering kindergarten students in California shifted from majority white to Hispanic majority. Hispanics are least likely to graduate from high school

Page 6: A system approach to cyber security

Lack of Standards in Research White Collar Criminals

Federal Contracts earmark the

funds specifically to populations;

◦ where people are on food stamps,

on aid and/or below median income.

◦ special needs populations

California Education Legislation

passed in 1998 Escutia

◦ All unused education dollars are to

be prioritized into the underserved

zip codes

We need to protect and

enforce ◦ criminals are openly creating

businesses

◦ Targeting single women

◦ Targeting senior citizen’s

◦ Targeting the disabled

◦ Targeting children

Page 7: A system approach to cyber security

We know the NCLB populations in the State are any variation of the known minorities Hispanic, African and American Indian in all states. ◦ We can assume these are the left behind who have no education

◦ We can assume no employer = no taxable income

◦ We can assume debt or cost without benefits to budget income

0

2000000

4000000

6000000

8000000

10000000

AfricanAmerican

AmericanIndian

Asian Islander someother

Two orMore

Races

AnyHispanicor Latino

White

Population 1680065 215755 3914815 107501 3326510 844300 9255440 8784926

Po

pu

lati

on

ove

r 18

California Population by Race Error Margin +/-

African 4+

Native 3+

Asian 5+

Islander 1+

Other 26+

2 or more 12+

Hispanic 1+

In thousand(s)

Page 8: A system approach to cyber security

More Women in the State Fewer are veterans

0

2000000

4000000

6000000

8000000

10000000

12000000

Veterans Non Veteran

Males 980349 10827552

Females 98889 11687471

Po

pu

lati

on

Civilians to Veteran 18-64

13400000

13500000

13600000

13700000

13800000

13900000

14000000

14100000

14200000

14300000

Male Female

Total Population 13680413 14214354

Nu

mb

er o

f P

erso

ns

ove

r ag

e 18

Total Population by Sex

Women are inadvertently or perhaps strategically not part of the plan or focus from

Private Sector with regard to employable

Page 9: A system approach to cyber security

Subjective Data Fact-Tax revenue

We must truly understand the data in order to source it from a correct source.

When a correct source is found, we must really know how it can be used.

In this example, populations are totaled. ◦ Each year summarized in to a total

isn’t the population Each year would show an increment

of the new growth

You typically would not show a total in population in sum Each year should be the current

TOTAL

Reward 40% of net sales

190 million

Page 10: A system approach to cyber security

The majority has become the minority

What could happen to our economy?

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 11: A system approach to cyber security

People who are like the kids or community are most likely to earn trust ◦ Mentors who think like the students are vital to success of the mentoring

relationships.

We have a tool formulated like a game www.playprelude.com ◦ A tool where our unique strengths are acquired in a positive way! ◦ A tool to ask the first questions about how I want the world to see me?

A tool which produces a table of the users, names can be hidden or revealed, to help quickly assess the teams ability to produce the intended results.

Struggling with executing the strategy You are probably all hearing the message differently

Culture mapping

◦ A tool where we can be grouped based on strengths or mix it up to ensure we have a diverse team. A tool which will stretch us all in having us show off our influencing abilities.

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 12: A system approach to cyber security

Objectives Outcomes

Prepare an educated child development workforce ◦ Increase the number of family child

care openings in underserved areas of the county

◦ Agencies located outside the 5 mile travel zone – serving pockets of poverty (I’m told)

Continuing Education Programs ◦ Community College in a zip code

with zero below median civilians ◦ Increase the number of ECE

teachers with a bachelors degree to meet the demand in underserved areas

We know many childcare

businesses were opened in

areas without the demand. ◦ Providers were never told the

children from poor areas are

unlikely to travel to their location

Many grants were funded

using Child Development funds ◦ Students moved into high tech

careers rather than child

development

Wicked Design Solutions Copyright @ 2014 Lisa Martinez 408-638-9016

Page 13: A system approach to cyber security

Domestic Violence Victims Fathers as custodial parent

Countless women have applied

for Grants to go into child

development or teaching ◦ No confirmation

◦ No response on application

◦ All have had to go to community

colleges

◦ All must pay for school on their

own with a small percentage from

FAFSA or school grants

Men who are sole caregivers have to attend classes as the only man in the room ◦ Even classes chosen to take to

help them recognize early warning signs of medical or mental health issues aren’t available without traveling out of the area

Men need stay away orders too!

Men need supervised visitation too!

Wicked Design Solutions Copyright @ 2014 Lisa Martinez 408-638-9016

Page 14: A system approach to cyber security

iStar

Self Awareness

iTag

Creative Thinking

weTeam

Like Minded Project

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 15: A system approach to cyber security

Teen Mothers Race

-

20

40

60

80

100

120

14095110

9511195112

95113

95116

95117

95118

95119

95120

95121

95122

95123

9512495125

9512695127

95128

95129

95130

95131

95132

95133

95134

95135

95136

95138

9513995148

Mothers Under 20 years at Birth

Under 20 -

100

200

300

400

500

600

700

80095110

9511195112

95113

95116

95117

95118

95119

95120

95121

95122

95123

9512495125

9512695127

95128

95129

95130

95131

95132

95133

95134

95135

95136

95138

9513995148

Series of Zip Codes by Race in Radar

Asian

SE Asian

Black

Filipino

Hispanic

Hawaii Pac.Isl

White

Two+ Races

Other/Unk

2009 Birth and Population file

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 16: A system approach to cyber security

How we learn? If gang members can learn anyone can. ◦ Different cultures respond differently, if you follow Russell Ackoff’s

work;

He did a study nearly 40 years ago.

He took on the gang problem in the city as a research project which he paid the leaders from each of the 21 gangs.

He paid them to be part of the research about learning where these men ages 17-19 could help build the way they learned.

17 out of the 21 leaders of Philadelphia gang members went on in life, got jobs in public and private sectors and a few in intelligence. Only 4 did not change their lives.

Another study where store owners were being robbed

They paid the local gang members to watch the neighborhood and the robberies stopped.

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 17: A system approach to cyber security

Intimacy Gradient

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 18: A system approach to cyber security

Intimacy Gradient Levels (NIEM group)

Whole government moves from high cost low

enforcement and low effectiveness in government

action ready using EA as the transformation opportunity

A hierarchy of authority implies the top level rules are adopted at the lowest level

Intimacy gradient level 3 Federal

Intimacy gradient level 4 state

Intimacy gradient level 5 county

Intimacy gradient level 6 city

Intimacy gradient level 7 community

assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access

to minimal viable information based on NIEM adoption.

Local control would only be achieved through adoption of standards universally

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 19: A system approach to cyber security

IG Level Assumptions

IG1 A person has every expectation of privacy and technology has no viable reason for

capture or retention.

IG2 A person expects interactions may be monitored for intelligence purposes although

Federal limitations. Specific to tax payer service layer inputs from IG3 to IG2

Published by Federal. Emergency response or notifications are published to IG2

from IG3

IG3 A person can expect interactions with Federal (view summary total Receipts) in

view form with any response to Federal Tax inquiries from IG2 pushed to Federal in

IG3 from the person or parent on behalf of the child

IG4 Any issues identified by healthcare providers are pushed from IG 4 to IG3 with

provider views and interactions limited to IG4. A person will respond from IG3

IG5 Educators will report into IG3 from IG5 including any mandated reporter to

community support system (TBD)

IG6 Justice System reports into IG3 from IG6

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 20: A system approach to cyber security

David Ing – INCOSE 2014 Intimacy Gradient

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 21: A system approach to cyber security

IG6

IG5

IG4

IG3

IG2 IG1

IG Level “Who” can be assigned to a group

IG1 Private a person is alone without devices

IG2 Private with Device and in own domain

IG3 Federal Tax pushes to view in IG2

IG4 Medical and Mental Health with in IG4 with

inputs to IG3

IG5 Education and Mandated Reporters push to IG3

and interact in IG5

IG6 Justice System “Pushes to” IG3 with interactions

in IG6

*See NIEM recovery use case assumes all IG2-5 data secured by region

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

Page 22: A system approach to cyber security

By Lisa Martinez Copyright 2014 @ Wicked Design Solutions

The End