The cost benefit analysis (cba) formula, Computer Network Security

The Cost Benefit Analysis (CBA) Formula

CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily calculated by using ALE from earlier assessments, before implementation of control proposed:

- CBA = ALE (prior) – ALE (post) – ACS
- ALE (prior) is annualized loss expectancy of risk before implementation of control
- ALE (post) is estimated ALE based on control being in place for the period of time
- ACS is annualized cost of safeguard.

Posted Date: 10/9/2012 2:23:49 AM | Location : United States







Related Discussions:- The cost benefit analysis (cba) formula, Assignment Help, Ask Question on The cost benefit analysis (cba) formula, Get Answer, Expert's Help, The cost benefit analysis (cba) formula Discussions

Write discussion on The cost benefit analysis (cba) formula
Your posts are moderated
Related Questions
I have an assignment of Computer Security to submit. Will you guys help me making my assignment???


implementing password policy in organisation

(a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certificate

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M