The cost benefit analysis (cba) formula, Computer Network Security

The Cost Benefit Analysis (CBA) Formula

CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily calculated by using ALE from earlier assessments, before implementation of control proposed:

- CBA = ALE (prior) – ALE (post) – ACS
- ALE (prior) is annualized loss expectancy of risk before implementation of control
- ALE (post) is estimated ALE based on control being in place for the period of time
- ACS is annualized cost of safeguard.

Posted Date: 10/9/2012 2:23:49 AM | Location : United States







Related Discussions:- The cost benefit analysis (cba) formula, Assignment Help, Ask Question on The cost benefit analysis (cba) formula, Get Answer, Expert's Help, The cost benefit analysis (cba) formula Discussions

Write discussion on The cost benefit analysis (cba) formula
Your posts are moderated
Related Questions
Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •    Apply safeguards wh

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co


Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

implementing password policy in organisation

Problem (a) Give two reasons for companies to implement security measures. (b) What is the regulatory expectation regarding i. healthcare information, ii. financial

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "