oEPA
    Vol. 3
\*\ ~ff>  January/February
No. 1
     AUDIOVISUAL TRAINING

                            John Staley

SDC Integrated  Services, Inc.,  on behalf
of  the  Management  Information  and  Data
Systems Division (MIDSD)  of EPA, has con-
tracted  for  audiovisual training  with
Edutronics/McGraw-Hill and DELTAK,  Inc.
These  contracts supply  the user  com-
munities of both  the NCC and  WCC  with
audiovisual training at no tuition.  Both
contracts will  exist throughout FY1980.

Edutronics  courses  are divided  into
modules, individual  units of  training.
Each module is  composed of an audiovisual
presentation  supplemented  by written
materials.  A module  can be presented  as
a single unit or as part  of the series  to
which it belongs.   In addition, modules
can be viewed by an  individual or  by  a
group,  with or without a  proctor.

DELTAK  training centers  on  the written
text, with  video segments and additional
textual  materials used  to  reinforce,
illustrate,  and  review the materials.
Like  Edutronics   courses,  individual
training units  can be  presented  sepa-
rately  or as  part of  a series.   Although
the lessons are designed to  be viewed  by
as few as one  student at a  time,  group
sessions led  by  someone  knowledgeable
in  the  course content  are   strongly
recommended.

Both curriculums   encompass  data  pro-
cessing,  management,  and communications
skills  and  can be  used for  training all
levels   of  management   and  technical
personnel.

Training materials are available  from
both suppliers, and  course   rentals are
based  on the  use of  one   module per
calendar  month.   Requested modules  must
be ordered  the first of  the month  pre-
                ceding the month the module  is required.
                Requested  modules  are rented from  the
                appropriate multimedia supplier  and  are
                sent to the requester.

                ADP coordinators at each EPA  location are
                the  focal  points  for  requesting audio-
                visual courses.   Persons  interested  in
                this training should contact  their local
                ADP coordinators.



                   COMPUTERIZED  LEARNING

                                            Chock  Galle

               The NCC has  supported the Sperry Univac
               Author  System for  Education and Training
                (ASET)  since June  1978, when  the  first
                locally developed   course  went  on-line.
               This course, Filemanager,  has  been  com-
               pleted  by  over  150 students  whose  com-
               puter experience before the course ranged
                from graduate degrees in computer science
                to no experience at all.

                ASET has  advantages  for both  the student
                and management:

                1.   Because it  is  inexpensive to run, it
                    appeals to  cost-conscious managers.

                2.   Because  it  is available  to  the
                    student at  any time  the  computer is
                    up,  it allows  irregular  scheduling.

                3.   Because it  presents self-paced, pro-
                    grammed lessons  (that  is,  certain
                    material  must be mastered before
                    more  difficult material is  encoun-
                    tered) , the student  can  progress at
                    a rate consistent  with personal
                    capabilities.

                ASET  is  also  valuable  to training  and
                educational personnel.  Educators partic-
                ularly interested  in one-to-one relation-
                                   (Continued on Page  3)

-------
NCC  HIGHLIGHTS
                               Tom Rogers
  V
     Air  conditioning  problems  in the
computer room have contributed heavily to
both degraded stability and total system
downtime.   Although several  steps  have
been taken  to solve these problems, the
only sure answer is to  relocate equipment
into the new computer space as soon as it
is available.

  f  A  preliminary  planning  meeting was
held with- Toxic's  personnel  to   prepare
for  delivery  of the DEC  System  2020 in
early January.
     A concentrated effort has been made
toward converting to S PERRY UNI VAC  Series
1100 Executive Level 36.   A major part of
this  effort is  the  commitment  to 8-bit
tape   labeling   scheduled   to   begin
December 10, 1979.
     In  response  to  a  request from  the
Office  of  Management  and Budget,  an
analysis  is  being  made  of  all   direct
costs  for operating  the  NCC data  center.
This investigation  will  identify  and
quantify  all  direct  monetary  costs,
including those previously  omitted, such
as Government personnel costs and  certain
facility costs.
  V
     After visiting  potential  backup
 sites,  a  task  force  has developed  a
 Program  Evaluation and Review  Technique
 (PERT)  chart and  impact  analysis  for
 implementing the  final  phases  of  the
 Disaster Recovery  Plan.  In  addition to
 security,  operations,  aid communications
 personnel,  the  final  team will  include
 systems analysts  (who will  create  an
 operating  system  compatible  with  NCC
 users and with  the  alternate  site's
 hardware configuration) and user  support
 personnel  (who will meet  with  potential
 users  and  develop necessary processors)*
                                                WCC  HIGHLIGHTS
                                                                          Maureen Johnson
     Job Stream Manager for MVS.  The WCC
is making the Job  Stream Manager (JSM) at
the  COMNET  facilities  simpler,   more
reliable, and easier to use.   To achieve
this  purpose,  Job scheduling will  be
virtually  the  same  at  WCC  as at  NCC.
Three priorities  will  handle day-to-day
processing, and a special  priority  will
handle jobs which need special consider-
ation.    This  special  priority   will
require  the  permission  of  the  user's
ADP Coordinator before  the job is  sub-
mitted and will allow any  job  to be run
immediately during the day for  a  charge
of  six  times  the normal rate.    The
implementation date for the new JSM  will
be  announced  by  User  Memo  when   the
schedule is established.   Making the JSM
simpler will ease the task of taming the
MVS  System  and,  in  turn,  will  ensure
better performance.
     Network Problem Solved.   An inten-
sive effort  from  COMNET  and COMTEN  per-
sonnel has resolved  a major  network prob-
lem  which  caused  excessive line  drops
during  September  and  October  and  which
was  originally  thought  to  be  caused  by
trunk   circuit  errors.    Erroneously
detecting  circuit  problems, the  COMTEN
processors initiated a trunk flush opera-
tion which  terminated all active users.
The  result  appeared to be line drops  to
the  affected   users.     Trunk  circuit
stability  has  increased  dramatically
since   the  problem  was  resolved  in
October.
                                                     Data Backup.   Technical  direction
                                                has  been given  COMNET  to  establish  a
                                                secure offsite storage vault  for  sensi-
                                                tive WCC  user and  system  data.   Users
                                                will continue  to be  encouraged to protect
                                                their data through its use.
                         The  deadline  for
                         March/April  issue
                         February  29, 1980.
                                            contributions  to  the
                                            of  EPA  Data  Talk  is

-------
      (Cont. from Page 1)
ships find  that  ASET  accommodates  their
most  imaginative  efforts.   Also,  in-
structors  with  no  previous  computer
programming experience  can  easily  code
ASET  lessons.   Instructors,  however,
should have  some understanding of  pro-
grammed  Instruction  techniques   (for
example,    those   of    Jerome   Lysaught,
B.  F. Skinner,  or  other  educational
technologists).

Following  are  some  examples  of  ASET
training  programs developed by  the  User
Training  ASET staff.    The  first  two are
accessible  without  an  ASET  student
registration.    The  remaining courses
require individual ASET  registration  by
the student.
     <§HELP*ECL.  On-line, ECL  command
     assistance  can  be   obtained  by
     entering this command.

     @INTRODUCT10N*NCC.     Entering  this
     command   gives   the   student   a
     30-minute history and  description of
     the  NCC  system:   configuration,
     component  descriptions,  management
     organization, usage   figures,  and
     other  general-interest  information.
     This presentation is ideal  for man-
     agers  who  have visitors  interested
     in what the NCC is and  in what it
     does.

     Computer Basics.  This introduction
     to  data processing  describes basic
     components,  registers,   symbolic
     access  to  mass  storage,   operation
     systems, Hollerith code, and a brief
     history  of  the   industry.    It  is
     aimed  at  data entry  level for new
     employees   and   cross-discipline
     trainees.

     Filemanager.  This course  introduces
     concepts  of the  SPERRY. UNIVAC  1100
     Mass  Storage  System   and  discusses
     data files, program files,  F-cycles,
     element  cycles, read and write  keys,
     symbiont  files,  and  use  of  the
     Sperry  Univac Text Editor.
•    ECL Introduction.   The next step up
     from  Filemanager,  this  modular
     course treats  the  most useful  ECL
     commands.   This    course  and  File-
     manager  should prepare  the student
     to  use  the  NCC  system  in  all
     respects  except that of higher-level
     programming   languages   such   as
     FORTRAN,  COBOL, PL/1, etc.

The  latter three  courses  were developed
at NCC and are being used now at over 40
other  major  Sperry  Unlvac sites  under
distribution agreements with the  USE
Subcommittee   on  Computer    Assisted
Instruction.

Also available  are  courses  developed by
Sperry Unlvac  in the programming language
BASIC,  the SPERRY UNIVAC  CTS  Processor,
and the programming  language COBOL.

For  information  regarding  ASET,   call
User    Training   at   (919)   541-3648
(FTS 629-3648).
           BIBLIOGRAPHY  OF ADP
              LAWS AVAILABLE
                 FROM OMB
The  Office  of Management and Budget has
compiled an annotated bibliography of ADP
laws, policies, and regulations.  Most of
the  material  referenced  in  the biblio-
graphy is in  MIDSD's  Information Manage-
ment  Controls Branch  files.   The Office
can  also provide  information on where to
locate copies  of  the  laws,  Executive
orders, OMB  circulars,  GAO reports, and
FIPS  standards.
The bibliography has been  distributed to
the Regional ADP Branch  Chiefs, but more
copies are available.   If you need  a copy
or  if  you  need  assistance  locating  a
document  or  reference,  call Peg Hall at
 (202) 755-0800.

-------
                         ADP   SECURITY
                           Marguerite I.  Hall,  Computer  Specialist
           This Is the  second  in a series of four articles on  ADP Security.   The first article
           reviewed the  peculiarities of ADP that make it Inherently insecure.  This article looks at
           goals,  the scope of  ADP security,  and its key concepts  and terminology.  Because of its
           length  only the first half appears  in this issue of EPA Data Talk.  The second half dis-
           cusses  protection  of our  ADP resources,  control, and risk management.  The third article
           traces  the development of awareness of  ADP security in the  Federal sector.   The fourth
           article covers EPA's recently developed  Agencywide security program  and our plans  for  a
           staged  Implementation.
                                   Core Concepts:  Part  I
It's  probably  true  of  all  new disciplines.    They emerge  with fuzzy  concepts,  amorphic
scopes,  and  tortured terminology.   ADP  security  is  certainly no  exception.   Goals  are
confused  with  policy,  policy  with  standards,  standards  with  guidelines,  guidelines  with
procedures,  and procedures with goals.  Antonyms are  transformed  into synonyms.   Synonyms
diverge never again to meet.

ADP  security  just  isn't all  that  complicated.    Most of  the   principles  are  things
2-year-olds  know  intuitively:   fire  burns, objects fall,  locks  go  with  keys,  accidents
happen, there are good people,  there are bad people, and sometimes people hit  back.

With  a little thought,  scope  can  be delineated,  goals  set,  and  concepts  communicated.
That's  the intent  of this article.   While  the scope,  goal,  and concepts  were worked  out
with EPA  in mind,  they probably  are  fully  compatible with other organizations  and  missions.
Whether  an  agency's products   are  clean  air   and  clear  water   (like  EPA's),  or  military
weapons,  or  global secrets,  or welfare checks, concerns are  about the same—that  is,  doing
something  about ADP's inherent  insecurities.

The  scope of  ADP  security needs to  be defined first.   Scope concerns boundaries:   what's
out  and  what's in.   What's not  ADP  is out.   What's  ADP is in.   Data processing facilities
are  in.    Computer hardware  and peripherals are in.   Telecommunications  networks are  in.
Sensitive  application  systems  are   in.  Application systems critical to  EPA's mission or
operation  are in.  Documentation is in.   Personnel  operating and  maintaining  sensitive or
critical  application systems are in.

On a different level, scope  covers  those areas  of ADP which are subject  to problems because
of ADP's  complexity, its  concentrated and  intangible  assets,  and  its  accessibility.   In
other words,  those areas where  you're  likely to find the nondata "D's" of ADP:   disruption,
destruction,  diversion, and  disclosure.

There's also  a third dimension  to  scope.   Many security programs are structured to Include
data  center  reliability  and  accuracy.    EPA's  program doesn't  include them  since  this
dimension has  already  been  addressed, and  seems  to fit  better,  in  our  various  computer
performance  management and reliability programs.

Once  scope has been carved  out, goals  can be defined.   Goals are ideas  at the head of
hierarchies   or  at the  top of  tree  structures.   Good  goals  last a system's   life.   Goals
should be coded in 25 words  or less.  EPA's ADP security  goal meets  all  the  above criteria.
It Is  to:

                  TAKE ALL REASONABLE MEASURES TO PROTECT  OUR  ADP RESOURCES

Now  I  realise  that you need to understand what's meant by "take" and "all  reasonable" and
"measures" and "protect"  and "our ADP  resources" to  have the goal be anything other  than a
jumble  of Jargon.   That's  the  intent of the  remainder  of  this article:   to explore the

-------
underlying Ideas that give  the  goal  meaning;  to  make it glitter, if you will.
stand, you'll need to become familiar with  eight  concepts:
                                                       To  under-
     1.  ADP Resource
     2.  Threat
3.  Vulnerability
4.  Adverse Event
5.
6.
Likelihood
Risk
7.   Control
8.   Risk Management
ADP RESOURCE  comes  first since  it's  the
most basic.  I like to think of this con-
cept in  terms of the  structure  pictured
in Figure 1.

At the base you  see "facilities,"  "hard-
ware,"  "software,"  "data,"  "supplies,"
"documentation,"   "people,"  and   "pro-
cedures."   The  interaction  of   these
elements,  one hopes,  results  in  the
middle  layer,  "service."    "Service"  is
computer  time, telecommunications,  data
storage,  user  support,  and  application
system   development   and   operation.
"Service"  to   be  "service"  needs   to  be
available to  those  authorized  to receive
it when  they   request  it.   "Information"
is at  the  top  of  the  triangle.  It's the
ultimate ADP  resource.   It's what  every-
thing  else  is on  the floor  to  support.
                               Figure 1.  ADP Resource
An  important  thing  to remember about ADP resources is  that  they have  value  which usually
can be  expressed  in dollar terms.  It costs money to reprogram and redocument.  Unauthor-
ized access costs money.  Service delay costs money.   An information ABEND costs money too.

The next concept is THREAT.  Threats are the things that go bump in the night.  Threats are
out to  get  your ADP resources.   They  attack your  facilities,  your hardware  and software,
your data, supplies, documentation, people,  and the procedures  people follow.

In  graphic   form,    threats   look  like
Figure 2.

Fortunately,   threats   are   easy   to
recognize.   They come in  just two basic
forms:   (1) people, and (2) change in the
environment.

ADP resources  have  problems with people.
That's because people do dumb  things, un-
expected  things,  and  bad  things.   They
steal,  they  subvert,  they  sabotage, they
smuggle, they sicken,  they  smoke  and
spill Coke  in computer rooms.   They have
maimed  memory,  clogged  channels,  torn
tapes,  and  damaged  disks.   They have put
bullets  through  the  hearts of   innocent
CPU's.                                                     Figure 2.   Threats

ADP resources are  also threatened  by uncontrolled change—change caused  by fire,  flood,
heat  or humidity, wind or  weather,  shakeup or shakedown, explosion  or implosion, dust or
dirt, power  peak or power failure.   All in all, ADP resources much  prefer  being kept in
clean, well—lighted places.

-------
Threats have another attribute too.   They occur  in finite  time.  "Never" is never a threat.
The  term  used most  often  is "probability of  occurrence."  Probabilities  of  threats are
measured in hard clock times, such as once a  picosecond, once a memory cycle, once a fiscal
year, or once a century.  There are  lots  of statistics  readily available on the probability
of threats.  NBS has maps showing the frequency of earthquakes, hurricanes, thunderstorms,
and brownouts.  There are publications that predict fires  and floods.  You can look up your
chances of  civil  disturbances,  sun  spots, and  accidents  on Interstate  270.   If  you need
drug addiction data, fraud facts,  and sabotage  statistics,  they're available too.

The  third  concept  is  VULNERABILITY.
Vulnerabilities  look   like Figure  3.
Threats can't reach an ADF resource  with-
out  the assistance  of   a  vulnerability.
Vulnerabilities are holes  threats  sneak
through or  the weaknesses  they  exploit.
Vulnerabilities, unlike  threats,  come in
many shapes  and sizes.   The most common
form of vulnerability is poor management.
It's followed  closely by disorganization
and  disorder.   Vulnerabilities can  also
be recognized through open-door  and  open-
data policies,  poor  training,  and  poor
morale.   Inadequate  or Improper  pro-
cedures are way up  there too.   If you've
seen undocumented software,  you've seen a
vulnerability.  Likewise, if you've seen
unaware or unconcerned users.                         Figure 3.  Vulnerabilities

ADVERSE EVENTS are  the next  concept.  They result  from the  combination of threats, vulner-
abilities, and ADP resources.  You can't  have  one without the  others.  When a  threat  takes
advantage of a  vulnerability and  does  in your  resource, you too can experience the  thrill
of an adverse event.  Adverse events are roughly categorized into  losses and abuses.

Losers  first.  You can lose  facilities,  you can lose hardware.  You can lose  software and
data.   You  can lose supplies and  documentation.  You can lose key staff.   The grand  total
is often denial of service and, ultimately, of access  to  the information you need when you
need it.

Abuse  equates  to the unauthorized  and  unwanted.   It comes  in the  form  of  unauthorized
access  to services,  of unwanted destruction  or  alteration  of  data and  software.   It's
diverted paychecks,  tax  returns,  and  phony invoices.   There's  also  unauthorized disclosure
or diversion of confidential Information.

Figure  4  Is an adverse  event.  You have
an  adverse event when  rioters  take over
your data center.   It  happened  recently
in  San Francisco.   You have  an  adverse
event  with  every  Playgirl/Playboy calen-
dar  that  rolls off  your  line  printer.
You have an adverse  event with every fire
that  burns,  flood  that soaks,  current
that surges,  earthquake that shakes, and
storm   that  interrupts.    You  have an
adverse event with  every  bowling score,
recipe,  or   doctoral  thesis   stored
on-line.   You have  an adverse event when
the    computer     science   students
scramble  for   final    grades,    play          Figure 4.   Adverse Event

-------
crash-the-computer,  or develop  realtime,  interactive,  conversational, user-oriented  ver-
sions of "Star Trek."
Both  the  next two  concepts,  LIKELIHOOD and  RISK,  relate  to  adverse events.   Likelihood
addresses  chance,  and risk addresses money.   Like  threats;  adverse  events  also  have prob-
abilities.  They're called likelihoods.  If there is a probability of a threat occurring,  a
suitable  vulnerability,  and  an ADP  resource to be  had,  you  have  a  likelihood.   Where
there's a  river  or rain or pipe  or sewer  or water cooler  or fire  department,  there's  the
probability of  an occurrence of a  threat  (water).  For  the likelihood  of  an adverse event
(flooded equipment and supplies), you also need  a vulnerability.  In this  case  the vulner-
ability coulvl be no drain or no  sump  pump or no rolls  of  plastic  sheeting mounted in  the
computer room.   The plastic,  however,  doesn't do much good if there  are no scissors handy
for cutting.  One installation drowned discovering that vulnerability.

Figure 5 pictures the difference between
threat probabilities  and likelihood.

Likelihoods,  like threats,  occur in real
time.  The calculation of likelihood is a
bit  trickier  than coming  up  with  the
probability of  a threat, though.   That's
because assessing vulnerability is often
pure  judgment call.   You can  dial your
local precinct  and get crime statistics,
but what's the likelihood of the intruder
arriving  at  your  facilities   just when
your  guard is asleep  at  the  closed cir-
cuit screen?
Figure 5.   Difference Between  Threat
     Probabilities and Likelihood
Risk tells you about the cost of loss or abuse  from  an  adverse  event  over  time.   The first
question is:  What's  the value  of  the ADP resource that will be abused or that you'll lose
if a given adverse  event  occurs?   The second question involves likelihood:   How  often can
you  expect  that particular  adverse  event  to occur?   Remember, the  adverse  event  results
from  a  particular  threat  exploiting  a  particular  vulnerability.   It's  very  specific
reasoning.   Obviously,  the greater the value of  the ADP resource  and the more  likely the
adverse  event, the greater the risk.

If you're the IRS,  you worry a whole lot  about the  integrity  of  your systems programmers.
If  you  operate  a data  center  in Washington,  D.C., you  don't lose  a  lot  of  sleep over
earthquakes.
In  Figure 6  I've  taken a  few liberties
with the  classic Illustration of likeli-
hood and worry.

Risks  are usually expressed  in  terms of
dollars per  year.   After all, that's how
we budget.  Your risk might be $1,000,000
per year  from a major  fire to your data
center or $5,000 a year from  the theft of
computer  time.   There  are various short
cuts  and  formulas  available  to  compute
risk.   NBS  has put out  FIPS  PUB 31 that
points  the  way.   It's  all very workable
--that Is, once you've come to terms with
"likelihood."
      High

       L
       I
       K
       E
       L
       I
       H
       0
       0
       0
      Low
               WORRY
DON'T

  WORRY
$/ADVERSE EVENT
High
     Figure 6.   Likelihood and Worry

-------
           CONFERENCE

                      Southern  Pines,  NC
                            February 11-15,1980
      UMITIO STATES
•NVnOMMINTAL MOTICTION ACCNCY

National Computer Center

 Research Triangle Park

  North Carolina 27711

     OFFICIAL BUSINESS
PENALTY FOR PRIVATE USE S3OO
 AN EQUAL OPPCMIfUNfTT EMPLOYE*
POSTAGE AMD PEC* PAID
 U S ENVIRONMENTAL
 PROTECTION AGENCY

     EPA-M9

-------