Reference no: EM131406430
Return on Security Investment (ROSI)
Actions for 'Return on Security Investment (ROSI)'
Must post first.SubscribeHide Description
This discussion item is part of the Analysis of Alternatives exercise.
Your CISO has asked you to lead a Brown Bag lunch discussion about the costs and benefits of investments in security technologies. The reading assignment for this discussion is: Introduction to Return on Security Investment: Helping CERTs assessing the cost of (lack of) security.
You have been asked to prepare a short discussion paper to be used to spark discussion amongst the attendees. Your paper must address the following:
- What is the ROSI calculation?
- How is it used to evaluate cybersecurity technologies?
- What are the limitations of this metric?
- How can this metric be used to evaluate one or more of the technologies selected for study? (refer back to Week 6)
Post your three to five paragraph short paper as a response to this discussion topic. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.
Reference
European Network and Information Security Agency. (2012). Introduction to Return on Security Investment: Helping CERTs assessing the cost of (lack of) security. Heraklion, Crete, Greece: Author. Retrieved from https://www.enisa.europa.eu/activities/cert/other-work/introduction-to-return-on-security-investment/at_download/fullReport
Automobile class for a dealership
: Create an Automobile class for a dealership. Include fields for an ID number, make, model, color, year, vin number, miles per gallon, and speed. Include get and set methods for each field
|
Primary target of systems design
: What is the primary target of systems design and what phases are included in the systems design?
|
Pressing ctrl-c in the python shell
: You can interrupt the above loop by pressing ctrl-c in the Python shell. A neater way of handling the escape from this infinite loop is to enclose this code in a try-except block.
|
How an interrupt handler would address the event
: Outline the process that occurs when a hardware interrupt is generated by a disk controller. Set the context for the interrupt (disk read or write) and describe how an interrupt handler would address the event.
|
Return on security investment
: Return on Security Investment (ROSI) Actions for 'Return on Security Investment (ROSI)' Must post first.SubscribeHide Description This discussion item is part of the Analysis of Alternatives exercise.
|
Existing network configuration
: What potential problems can this upgrade cause? What must you verify about the existing network configuration before you perform the upgrade.
|
Implement iso 26000 guidelines for the company
: Determine whether the current organizational strategies align with your vision for the ISO 26000 guidelines. Support your perspective with specific examples.
|
Calculate the sales tax and total due
: Write a program to input a purchase amount and calculate the sales tax and total due. The sales tax depends on the county identifying code. Counties with a number less than 8 have a 5% sales tax.
|
Explain the impacts on the economy environment and community
: Identify and explain the impacts on the Economy, Environment, Community and Society. Unfortunately there are some projects we will not allow to be done because they have bene done so many times in the past.
|