Benchmarking-information security, Computer Network Security

Benchmarking

An alternative approach to risk management is Benchmarking. It is process of seeking out and studying practices in other organizations which one’s own organization desires to duplicate. One of three measures characteristically used to compare practices:

a) Metrics based measures

b) Process based measures

Metrics based measures are comparisons which are based on numerical standards, such as

-  The numbers of successful attacks
-  Staff hours which are spent on systems protection
-  The dollars which are spent on protection
- Numbers spent on protection
-  Estimated value in dollars of information lost in successful attacks
- Lose in productivity hours associated with the successful attacks

Process-based measures are less focused on numbers and more strategic than Metrics based measures. It enables organization to examine activities an individual company performs in pursuit of its goals instead of the specific of how goals are attained. There are several legal reasons. They are:

Standard of due care: when adopting levels of security for the legal defense, organization shows it has done what any prudent organization would do in same circumstances.

Due diligence: demonstration that organization is diligent in ensuring which implemented standards continue to provide needed level of protection. Failure to support standard of care or diligence can leave organization open to legal liability.

Best business practices: security efforts which provide a superior level protection of information.

While considering best practices for adoption in an organization, consider:

•    Does organization resembles identified target with best practice?

•    Are resources at hand similar?

•    Is organization in a alike threat environment?

Posted Date: 10/9/2012 2:25:03 AM | Location : United States







Related Discussions:- Benchmarking-information security, Assignment Help, Ask Question on Benchmarking-information security, Get Answer, Expert's Help, Benchmarking-information security Discussions

Write discussion on Benchmarking-information security
Your posts are moderated
Related Questions
UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

Problem 1: Show what are the benefits of project quality management? • Customer satisfaction • Reduced cost • Increased competitiveness • Fulfilment of social and economic r

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared