EPA
    Vol. 3
March/April  1980
No. 2
ADP  CONFERENCE  EMPHASIZES  CHANGE
                              Ken Spears
 Talk  of change dominated  the fourth EPA
 ADP  Conference,   held this year  from
 February  11   through  February  15  at
 Southern  Pines,   N.C.    The  regional
 sessions,  the  general  sessions,  and the
 technical  sessions  all  stressed  the
 complexity of "changing    information
 resources."    As  R. C.  Stringer  (MIDSD)
 noted in  his  opening  remarks  for the
 conference, the continuing change  in  EPA's
 data  processing management programs and in
 data   processing   technology  "strongly
 reflects  the  extension   of  computer
 technology  from the  large-scale  computer
 room  to  the office,  library, laboratory,
 and  virtually   every  facet   of  the
 organization."

 To  control such  change,  the  conference
 participants  generally agreed  on three
 methods:    (1)   plan  carefully  for
 information  requirements,   (2)  manage
 existing   and    evolving    resources
 effectively,   and  (3)  consolidate in-
 formation  systems  if possible.  How well
 these methods  work depends,  of course, on
 thorough preparation.  Reliable audits and
 studies  are  usually  necessary  before
 detailed planning  begins.


 DATA CENTER ACTIVITIES

 According  to Don  Fulford (MIDSD/NCC), the
 National   Computer   Center  and   the
 Washington  Computer Center  also  underwent
 a  year of  change  and  are currently in  a
 transition  period.  Fulford  presented the
 major achievements  of both centers in
 FY1979 and previewed  plans for the future.

 During  the   past   year   both  centers
 experienced  continued  growth,  increased
                                         M ' •
           R. C. Stringer  (left). Director, MIDSD, presents Don
           Fulford, Chief, Data Center Branch, with the Service
           Award  from the  USE,  Inc.   (Univac Scientific
           Exchange) group.
          direct  services  to  users,  and  upgraded
          their  hardware, software,  and security
          systems.     In  addition,  at  WCC  the
          dedicated organization matured and the
          center  converted to  the Multiple  Virtual
          Storage (MVS) operating system.   The NCC
          achieved record  stability,  added three new
          systems,  and  transferred  equipment into
          its new building.  "We have established a
          solid base," Fulford  said,  "from  which we
          can move on to the  future."

          Both centers  plan  to  meet  the  increasing
          needs of  their users, especially in terms
          of  reliability,  maintainability,  and
          availability.   To  achieve this goal,
          Fulford sees  improved communications with
          users as  indispensable.   "As we move into
          the '80's," he said,  "our  involvement and
                    (Continued on page  3)

-------
WCC HIGHLIGHTS
                          Maureen Johnson
      All  WCC  processing  is  now  on  the
MVS/TSO/WYLBUR  operating system.   The  new
MVS  system  was made available to  users on
both  the  IBM 370/168  and  IBM 370/3032 on
January  14,  1980.    Significant  improve-
ments  in performance  and  stability have
resulted from the conversion.

  y  WYLBUR users experienced  a  high  level
of frustration during  December and January
because of frequent  lapses   in WYLBUR
availability  and   associated   loss   of
workspaces.   Several major problems, most
of which are  now resolved, contributed to
the unstable WYLBUR  situation.
     The   XEROX   1200  located  at  the
Washington Distribution  Center  is  in  final
testing  and  will  soon  be  available for
user  production  work.    The  XEROX  1200,
which  produces   high-speed,  high-quality
hardcopy  from print  image  magnetic  tape,
is 2  to  3-1/2 times faster than the  WCC's
high-speed printers.
     The  Washington  Distribution  Center
will   be   expanded   this   summer   to
accommodate  a  PDP-11/70  minicomputer
system and  thus will  enhance  the overall
capabilities of the Distribution  Center.
     EPA Data Talk ia published bimonthly by the
     EPA Management Information and Data Systems
     Division, National Computer Center, for EPA
     personnel and contractors interested in
     general ADP topics.

     Comments,  suggestions, and news  items
     should be addressed to:

         William G. Allen
         Editor, EPA Data Talk
         National Computer Center
         Research Triangle Park
         North Carolina  27711
     To ensure that our distribution list is up
     to date, please  indicate any required
     changes on the mailing label attached to
     this issue  and  mail  it  to  the  above
     address.
NCC HIGHLIGHTS

                              Tom Rogers

   w  The  expansion  to   the   computer
facility building has been  completed and
was  accepted  in  early January.   The new
IBM   3800  Laser  Printer  was  immediately
installed   there  along  with   selected
hardware from  the  current  Sperry Univac
equipment.      The   printer   provides
high-quality   and   high-speed   print
capabilities  to  the  NCC user community.
All   printers,   high-speed   disks,   and
communications/symbiont processors are now
operational  within  the new space.
     The IBM 3800 Laser Printer, installed
in  January,  is currently  available  to
users   on   a  limited  basis.     Further
utilization  details  will  be  distributed
through user raemos .
  V.
     The revised NCC User Reference Manual
(URN)  was  distributed  to  the  NCC  user
community  on  January  30.    The  revision
process  began  about  a year  ago  and  has
resulted   in    an    easier-to-use   and
easier-to-update   reference   document.
Special   thanks  go   to   the  RTF   ADP
Coordinators who reviewed the  final draft.
     Progress  toward  completing  the  NCC
Disaster  Recovery Plan  was delayed  when
the Bureau of Census declined  to  sign the
formal contingency agreement with the NCC.
Although  an  informal  agreement had  been
reached, at  the  time of formal commitment
the  Computer Operations  Division  within
Census was directed  to procure guaranteed
time at  a commercial facility.   However,
the U.S.  Treasury Department's Office  of
Computer Science has expressed interest in
a mutual backup agreement.  This possibil-
ity is being studied now.
    The  deadline  for contributions  to the
    May/June issue of EPA Data Talk is April
    25,  1980.   Contributions received after
    that  date  will  be  published  at the
    discretion of the editor.

-------
         (Continued from page 1)
planning with the  users  will have to
increase."    Already the  centers  have
expanded  their  efforts  toward this goal.
They  now  offer,   for  example,  more
training,  more   printed  and   on-line
materials,   and  more  opportunity  for
personal communication.
 PLANNING AND MANAGEMENT


Like  the  address  of Fulford,  that  of
Robert L.  Chartrand (Library of  Congress)
ranged from the past to  the  present to the
future.   His  keynote  address centered on
the fact  that  the present  is  a  time for
redefinition and recommitment in terms of
information   technology.     "So   often,"
he   said,   "our   management   at   the
departmental/agency level  is so  busy  it
does not  take  time to learn enough about
data   processing  and  good management
techniques."

Chartrand  reminded  the  participants  that
now that ADP,  traditional  Library Science,
and  information  services  seem  to  be
merging,    workers   must   learn   what
information resources  they need,  which
ones  exist,  where they  are,  what  they
cost,   and  how  they can be  accessed.   He
then  reviewed   government's  endeavors  to
help.    Within  the past  two  years,  for
example,  a series  of studies  have  been
made  and  75  laws  passed  in  Congress
regarding  information policies,  programs,
and technology.   In addition, an  Office of
Federal   Information  Policy   has  been
proposed   and   the  American Society  of
Information Sciences  has  provided  a  list
of  149   current  on-line   data  bases.
According to Chartrand,  these concentrated
efforts to enumerate information  resources
will continue.

In  a   session  on "Decentralization  of
Timeshare,  Plans,  and  Budget,"  Ken Byram
(MIDSD),   Dan   Cirelli   (MIDSD),    and
Dick   Boyd  (MIDSD)  discussed   data
processing planning,  data processing
budgeting,  and  the role  of  the  Steering
Committee.  To  supply  adequate information
on requirements  for timeshare services and
to  provide  MIDSD  the  review and control
authority  it  needs,  the  procedure  they
recommend would  tie timeshare budgeting to
the Agency's successful  Zero Base Budget
(ZBB)  process.
 Sam Brown,  Director, National Computer  Center,
 addresses the conference.
The planning process would consist of  (l)
overall   guidance   from  the   Steering
Committee,  (2)  a  working  group  by office
or media, (3) a requirements  plan  reviewed
by the Steering Committee,  (4) the  details
added,   (5)  final  Steering   Committee
approval, and  (6)  a  5-year  plan  updated
yearly.   The  ZBB  process  would  furnish
MIDSD the details and  precise information
necessary to justify requesting the  funds
it  needs  to  run  the  data   centers
effectively.  The  Steering  Committee  would
involve upper management in ADP processing
and would  help resolve conflicts  between
users and the Agency.

Formal   planning   and   management   of
systems  development  were  discussed by
Gene Lowrimore (MIDSD), John  Hart  (MIDSD),
Mary  Lou Melley  (MIDSD) ,  and  Vic  Cohen
(MIDSD).    To   reduce  dependency  on
contractor    support    for     systems
development,  the  team  recommends formal
management,   integrated  systems,   program-
wide coordination, and  ADP planning.  Such
an approach,  they  say, would  yield  more
intelligent use of  ADP  resources and more
effective use  of  ADP  systems.    Although
contractors  would   continue  to  implement
systems  requirements, management would
furnish  specific  statements  of  need.
Providing  explicit   information   elements
and design  and testing requirements,  for
example,  would  allow  MIDSD more  control.

          (Continued on Page  6)

-------
                         ADP   SECURITY
                           Marguerite  I.  Hall,  Computer Specialist
             This  is the second in a series of four articles on ADP Security.   The first article
             reviewed the peculiarities of ADP that make it inherently insecure.  This, the second
             part  of the second article, looks at goals,  the scope of ADP security, and its key
             concepts and terminology.  Because of its length only the first part of this article
             appeared in the  last issue  of EPA Data  Talk.   The  third  article  traces  the
             development of awareness  of ADP security in  the Federal sector.  The fourth article
             covers  EPA'a recently developed Agencywide  security program and our  plans for a
             staged implementation.
                              Core Concepts:   Part  II
In a  way,  CONTROLS  are what it's  all about.   Controls counter  threats.   Control is  the
antonym  of vulnerability.   If  you  have a control,  you don't have a vulnerability.  If  you
have  a vulnerability,  you  don't have control.   A control  can  be  designed  to  counter  a
single  threat.   A  moisture detector will  alert  you to  the presence  of water.   Other
threats  are  best thwarted by a series  of  controls.   For example,  power supply problems  may
be countered  with  uninterrupted  power supply  equipment backed  up by banks  of batteries
backed  up  by  motor generators.    There  are  some controls  that  work   against  multiple
threats.   More barrier  for  the buck,  so  to  speak.   A guard at the  computer room door  can
prevent  theft,  mischief,  accidents,  vandalism,  sabotage,  and  the like.   Authentication
(you  are who  you  say you are)  and authorization  (you are privileged) software  prevents
unauthorized use of services, destruction, alteration, and  disclosure of data.

One way  of  categorizing controls  is  by  what you're  trying  to do with them.   The word  is
"strategy."    There  are controls   that prevent  adverse  events.   There  are  controls that
detect adverse events.  There  are  controls to minimize  the  effects of adverse events,  and
there  are controls to  recover from  an   adverse  event.   Table  1  gives  an example  of  a
control  strategy for fire loss.


                        Table 1.  Control  Strategy for Fire Loss
                                        • STRATEGY-
                    Prevent     Detect         Minimize         Recover

                                             Halon
                     Clean     Smoke         Offsite         Contingency
                     Room      Detector      Data Storage    Arrangements
A  second way to  categorize controls  is  by type.  There  are physical,  technical,  adminis-
trative,  and  managerial  controls.    Physical  controls  are  the  ones  thought of  first.
Physical controls are concerned  with facility site  and  structure,  physical  layout,  access
barriers,  and environmental  monitoring  equipment.   They're masonry  walls, vaults,  locks,
TV  monitors,  air  conditioners,  and  filters.    They're   fire  extinguishers  and  moisture
detectors  and  alarm annunciators, brooms,  mops,  and  vacuum cleaners.

Technical  controls are  imbedded  in hardware, peripherals, software,  and  telecommunication
gear.   They are diagnostic circuitry,  component  redundancies,  and memory-protect features.
They  are trusted operating  systems and  machine  accounting  routines.   They are  encryption
algorithms and  security violation reports  and hash totals and audit trails.

-------
     ADMINISTRATIVE
Administrative controls are every bit as important as technical and  physical  ones  but  take
a  little  more imagination  to picture.   Administrative  controls  concern people and  pro-
cedures.   Whom you  hire, when  you fire, how  you train, supervise,  and discipline  all
matter.  Who  is authorized  to do what to which, when, matters.  So  does log  keeping.   You
need  to  keep  track  of who  enters  a  sensitive area, who  receives a  delivery,  and  who
requests  a  sensitive  report.   The  procedures  you  develop and  follow  for  software
development and for software  and hardware modification matter too.  So  does  tracking usage
and chargeback.   You need procedures  to  rotate critical  data  through  offsite  storage  and
procedures for contingency operation in case of data center disaster.

Managerial controls  tie everything to-
gether.    Picture,   as   in  Figure 1,  a
three-tiered triangle with "management" at
the top,  "administration" in the  middle,
and "physical" and "technical" forming the
base.

Managerial  controls  concern  planning and
evaluation.   They involve  the allocation
of  people,  plant,   equipment,   time,  and
dollars.    They  include  formal  audit.
Audit means  an independent review  of the
effectiveness  and  efficiency  of  your
controls.   It's a check  to  make  sure that
your controls are actually in place, being
followed,  and  working.   When audit finds
things   amiss,   you're   back    in   an
interactive  loop -- that   is,  back  to
planning   and   evaluation,   resource
allocations, and another  audit.  For sure,
security isn't a one-time drill.

The final  concept  is RISK MANAGEMENT.   Recall  that  the  definition of  risk was  expected
cost,  over a certain amount of time, for the occurrence of a specific adverse event.   Risk
management adds another element:  selection  of  suitable  controls.   At  the most elementary
level, it's making sure  that the cost of the control is  less  than  the  risk.   It  would be
patently ridiculous  to install a $200,000 fire prevention  system at a  minicomputer  site
where the  risk is $10,000.

Control strategy  is  rarely,   if ever,  easy.   Choices range from  simple  to  sophisticated,
singular to serial,  inexpensive  to  exorbitant.   With each choice comes cost:  dollars for
installation and operation  of controls,  dollars for risk.  The trick is  to  pick  the  con-
trol which will result in the lowest total "cost."  Look at Table 2 and select  a control.

                       Table  2.  Example  of  Control  Strategy
PHYSICAL
             TECHNICAL
Figure 1.  Controls
Adverse Event

Theft

Control
Guard Service
24-Hour
3rd-Shift
"Cost"
Control Risk
$90,000 $95,000
$25,000 $35,000
Total
$185,000
$ 60,000

-------
If you  picked  the  guard  for  the  graveyard
shift,  you  picked  right.    The  price  of
control  is  less  than the  risk,  and  the
total  "cost"   is   the  lower  alternative.
Results  are  often surprising, things  you
wouldn't guess.  Hardware encryption makes
sense but software encryption doesn't.
Passwords must  be  changed  more often.      c
Employee  termination  procedures  need      $
reworking.  Figure 2 graphically  presents      T
this  effect.

The  total  "cost"  principle works just  as
well  for a whole  data  center or a complex
application system as it  does for  a  single
adverse event.  It's just  infinitely more
complicated.     In  fact,   thousands   of
calculations and hundreds of iterations on
the   calculations  are  often  required.
Obviously,  risk   management  is  a good
candidate  for  automation.    And  as  you
might  guess,  there  are  companies in  the
business of supplying proprietary software
so you can do just that.

In summary,  think back to our original  goal to

                 TAKE ALL REASONABLE MEASURES  TO PROTECT OUR ADP RESOURCES

"ADP  resources" you  now  know are  everything from hardware to  information.   "Protection"
you  know  too.   It's  the prevention,  detection,  minimization,  or recovery from  a  threat
exploiting a  vulnerability,  reaching a resource,  and causing  an  adverse event.   That's
control.  And  "reasonable"  is what risk management is about.  It elevates the selection of
protection from guesswork  to rational, predictable decisionmaking.   And  finally,  "take"
means "do it."
          REDUCED VULNERABILITY
      Figure 2.  Control Strategy
         (Continued from page 3)

Additional  training,  the  team  believes,
would  also  improve  systems  development.
To illustrate the value of  such  training,
three instructors from NADPI described  the
courses  they   teach:     Wayne  Savage
(DeBoever,  Savage,  and  Associates), "ADP
Project Administration";  John  Sherrod
(independent consultant),  "Overview of
Information  in EPA";  and  John  Censor
(Planning  & Control,   Inc.),  "Project
Management Principles and  Practices."

AUDITS AND STUDIES
Gerard   Hallaren   (IDC)   reminded  the
conference  participants  that  computer
technology advances  faster than most users
and  managers can  absorb  and  that both
hardware and  software  continue to  become
more  specialized.    And since EPA  has
embarked  on an  ambitious   procurement
program to sustain  its computing  resources
to  the year  2000,  he  emphasized  that  a
sound  knowledge of  computing  resources  is
essential.     J.   Michael   Steinacher
(MIDSD/NCC)  then  reviewed  the results  of
the many specialized studies undertaken  by
the Systems Acquisition and Implementation
Program  team to  prepare  for  this  large
computer service procurement.

Wilbur  D.   Campbell  (GAO)  described the
audit program at GAO,  the method  of making
audit  assignments,  and  the  strategy  of
integrating  the  results  of these  audits.
He  too pointed out  that  GAO  audits and
other  consulting reports show  the  need  to
change  ADP management  structure  and the
programs it serves.  Dan S. Soranno  (GAO)
reported that GAO has completed  its  audit
of EPA's ADP  program.  He  highlighted the
audit, the  approach  taken,  the  conclusions
reached, and the recommendations  submitted
by the team.

-------
 Edward J.  Hanley  (OMAS) presented  the
 recommendations of  the DAA Advisory Group
 on  Monitoring  and  reviewed  the basis for
 the  recommendations,   the ADP  management
 study  performed  by  Nolan  and  Norton.
 Hanley predicted  that   the  study  will
 become  part   of   a   major   management
 initiative  and  will  affect  hundreds  of
 Agency personnel.


 SYSTEMS CONSOLIDATION

 A.  Michael  Kaplan  (FMD)  reported  on the
 Office of  Resource  Management  (ORM)
 Integration Project.  The project  involves
 developing a management information system
 by   combining   data  from   Personnel,
 Contracts, Finance, ZBB,   and Grants.   The
 project  team   is  currently  working  to
 provide management  with   better  and  more
 efficient  information.    They  have,  for
 example,  furnished data to programming
 offices, developed  a project control  that
 allows users   to  access  data  in  the
 financial  management   data   base,   and
 directed  programming offices to input
 their  data  directly  into  the financial
 management  system.   In addition,  they
 hired  Arthur Young and  Associates  to study
 the requirements of management.

Donald Fitzpatrick (Arthur  Young   and
Associates)  discussed  the findings of the
ORM. study, "Alternative Strategies for the
 Integration of  ORM Information."   The
report  offers  four alternatives designed
 to improve information  handling capability
 in  ORM,  to  improve management of  ORM's
current information  resources,  and  to
assist ORM in planning  for future support
requirements.

Morris  Yaguda  (MIDSD)  and six  panelists
representing various activities in EPA's
Consolidated Permit  Program discussed  this
new  consolidated  approach to  contractor
resources  and management.

Currently, information  is  collected by EPA
and  the  states,  but  management lacks
common  facility and chemical  ID numbers,
standard geographical  codes,  data  element
standards, integrated information systems,
a  comprehensive  process  to  maintain
high-quality information,  and a formal
structure  to   manage   information   at
headquarters, in the regions,  and  in  the
states.
By   integrating   separate  information
systems and permit programs,  the  Consoli-
dated Permit Program  seeks  to  (1)  provide
complete  residual controls,  (2) remove
inconsistencies and overlaps,  (3)  stream-
line   permit  processing  to  a  single
regional  office,  (4) encourage public
participation,  and (5) reduce  costs.   And
by  showing  that  the  program  works,  EPA
hopes  to  foster  state participation  and
eventually  transfer  the  program  to  the
states.

How  to establish  a  Chemical  Substances
Information    Network    (CSIN)     was
demonstrated by Sidney Siegel  (OTS/OPIl).
CSIN,  a  network  of  coordinated  on-line
information  systems   concerning  chemical
substances,   can  provide   access   to
information in hundreds  of potentially
relevant  data bases.    Thus it could
satisfy  requirements  regarding  toxic
substances  legislation   and  a  broad
spectrum of related activities.

To  implement such  a  program,  Siegel  says
that you  need  two  things:   "the  physical
and  mental  attributes   of  an  alley
fighter."

According  to Siegel, CSIN could be used by
regulatory   agencies,  research  insti-
tutions, industry,  public interest groups,
and  educational  institutions.     Its
benefits include increased productivity of
professional staff, high  product  quality,
rapid response, and effective  interagency
data sharing.   A CSIN prototype,  he said,
will be in place with some capability  near
the end of 1980.


SPECIAL INTEREST GROUPS

New  to   this  year's conference  were
meetings held  by  user groups:   Regional
ADP Coordinators, Financial  Management
Officers  and  Users,  and   Minicomputer
Managers.    Where appropriate,  joint
meetings were conducted.

Included  for   the  second   time were   the
"Birds-of-a-Feather"  sessions.    These
small,  informal meetings  were devoted  to
special-interest  topics   such  as  word
processing,   RACF  security  and   MVS
conversion at  WCC, and distributed  data
processing.
     (Continued on page 8, column 2)

-------
8        NCC  REQUESTS

GRAPHICS  INFORMATION

                            Ernie  Watson
"A picture is worth a  thousand words" is a
quotation   especially   applicable   to
graphics  in   the  computer  industry.
Although  the  technology  for  graphically
representing  data  has  existed  for  some
time,  only  recently has it come  of age.
To better plan for this  "coming of age" in
EPA,  the National  Computer Center  needs
your input.

The  NCC  has mailed a graphics survey  to
all  ADP  Coordinators  in the Agency.   It
asks  for specific recommendations  and
poses questions about  current requirements
and support.  Thus it  is designed  to help
the  NCC  assess  not   only your  future
graphics requirements  but  also   your
present  level of satisfaction  relative to
graphics.

The  NCC  hopes  that your  ADP  Coordinator
will  seek  your  assistance.    If   not,
however,   won't  you share  your  viewpoint
with the  coordinator anyway?
         (Continued from page 7)
SUMMARY

The  conference  centered   on  change,
planning,   management,   and   systems
consolidation.   Its  overall  theme  of
"Information   Resources in  Transition"
recurred    frequently   as    the   310
participants  exchanged  ideas, outlined
plans,  and  highlighted  programs  and
studies.   The conference demonstrated  that
BPA's current  activities should give  the
Agency the blueprint it needs to build for
the future. R.  C. Stringer perhaps summed
up the general  feeling best in his closing
remarks.   "After meeting a lot of you,"  he
said, "I am far more optimistic about our
chances of success."
            UNITED STATES
      ENVIRONMENTAL PROTECTION AOENCY

      National  Computer Center
       Research Triangle Park
        North Carolina 27711

           OFFICIAL. BUSINESS
      PCNALTY FOR PRIVATE USE 93OO
               POSTAGE AND FCCS PAID
                U S CNVINOMMCNTAL
                PNOTCCTMN ACCNCT
                    KPA-U9

-------