Base lining-risk management, Computer Network Security

Base lining

•    Organizations do not have any contact to each other

•    No two organizations are identical to each other

•    The best practices are a moving target

•    Knowing that what was happening on in information security industry in the recent years through benchmarking does not necessarily prepare for what is next

Analysis of measures against the standards which are established. In information security, base lining is comparison of security activities and events against the future performance of organizations.

 Other Feasibility Studies

Operational: examines how proposed information security alternatives will contribute to organization’s efficiency, and overall operation

Technical: examines whether or not organization has or can acquire technology required to implement and support the control alternatives

Political: defines what can or cannot happen based on consensus and relationships between the communities of interest

Posted Date: 10/8/2012 6:52:23 AM | Location : United States







Related Discussions:- Base lining-risk management, Assignment Help, Ask Question on Base lining-risk management, Get Answer, Expert's Help, Base lining-risk management Discussions

Write discussion on Base lining-risk management
Your posts are moderated
Related Questions
Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.


Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1