Explain difference between metrics measures and measurements

Assignment Help Computer Network Security
Reference no: EM131041847

1. Please research cybercrime and post one article that you found, then do a summary of that article. Please comment on two of your classmate's postings. There is no time limit on the crime so it can be recent or in the past. Please ensure your primary posting is completed by Friday so there is sufficient time for each of you to comment on other postings.

2. Please use this conference to provide me your feedback on the courses. What were your experiences regarding the assignments? What did you learn in this class? What areas of the course do you think could be improved?

3. After reading Black, Scarfone, and Souppaya (2008), choose one of the cybersecurity measurement problems discussed by the authors. Explain the problem in your own words and address how and why this problem could impact a cybersecurity focused evaluation of emerging technologies or emerging applications of technologies which are intended for use in a business environment.

Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference:

Black, P. E., Scarfone, K., &Souppaya, M. (2008). Cybersecurity metrics and measures.In J. G. Voller (Ed.) Handbook of science and technology for homeland security (vol. 5). Hoboken, NJ: John Wiley & Sons. Retrieved from https://hissa.nist.gov/~black/Papers/cyberSecurityMetrics2007proof.pdf

4. Read sections 1, 2, and 7 in Bartol, Bates, Goertzel, and Winograd (2009)before attempting to answer this question.

1. Explain in your own words the differences between metrics, measures, and measurements.

2. What types of measures will you need to collect during your proposed technology evaluation?

3. How will you collect these measures? (What actions will be necessary to collect the required data?)
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference: Bartol, N., Bates, B., Goertzel, K. M., &Winograd, T. (2009). Measuring cyber security and information assurance: A state-of-the-art report. Herndon, VA: IATAC. Retrieved from https://buildsecurityin.us-cert.gov/sites/default/files/MeasuringCybersecurityIA.PDF

Reference no: EM131041847

Questions Cloud

Defining square-list this way produces : Unfortunately, defining square-list this way produces the answer list in the reverse order of the one desired. Why? Louis then tries to fix his bug by interchanging the arguments to cons:
How the trading platform works : The website has a 'Learn' tab, which contains information on the basics of forex trading. Please take the time to understand how the trading platform works before commencing your trading activities
Determine appropriate wacc for average-risk : Richard works for a firm that is expanding into a completely new line of business. He has been asked to determine an appropriate WACC for an average-risk project in the expansion division.
Plaintiffs in a class-action product liability lawsuit : The law firm of Dewey, Cheatum & Howe, a general partnership, represents 20 plaintiffs in a class-action product liability lawsuit, with trial scheduled to begin Monday of next week. It will be the biggest trial in the history of the firm, and the pa..
Explain difference between metrics measures and measurements : Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?
United states helped stabilize exchange rates : On June 23, 1997, Japanese Prime Minister Ryutaro Hashimoto spooked Wall Street. At a Columbia University luncheon, he appeared to warn that the Japanese might sell U.S. Treasury bills unless the United States helped stabilize exchange rates. The ..
Question regarding the world competitiveness report : According to the World Competitiveness Report 1994, with freer markets, Third World nations are now able to attract capital and technology from the advanced nations.
Who wants to create a culture of innovation : Suppose that you are the CEO of a technology company who wants to create a culture of innovation. What types of innovative people you need and how do you work with them in order to develop a culture of innovation?
Posting strong economic growth : During the 1990s, Mexico and Argentina went from economic pariahs with huge foreign debts to countries posting strong economic growth and welcoming foreign investment. What would you expect these changes to do to their current-account balances?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Difference between authentication and authorization?

What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?

  Survey of economic impact of operating system security

Survey of economic impact of operating system security violations

  What is the difference between ethics and morality

In United States vs. Davis, the U.S. Court of Appeals for the 11th Circuit ruled that a warrant was needed to access cell tower data. Who (what court(s)) must follow this ruling and why?

  Brief statement describing an it acquisition

Write a brief statement describing an IT acquisition by an organization about which you have knowledge. State whether the organization believes the acquisition met its objectives (e.g., improved the performance of the organization). State why you ..

  Explain how it is forwarded to its destination

Explain how it is forwarded to its destination and a packet arrived at router R2-m0 with destination address 170.14.24.12. Explain how it is forwarded to its destination.

  Can this many users be supported under circuit-switching

A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 20 Mbps, must share a link of capacity 100 Mbps.

  Describe methods for determining if user frustration

Describe methods for determining if user frustration is caused by poor system design

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd