The cost benefit analysis (cba) formula, Computer Network Security

The Cost Benefit Analysis (CBA) Formula

CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily calculated by using ALE from earlier assessments, before implementation of control proposed:

- CBA = ALE (prior) – ALE (post) – ACS
- ALE (prior) is annualized loss expectancy of risk before implementation of control
- ALE (post) is estimated ALE based on control being in place for the period of time
- ACS is annualized cost of safeguard.

Posted Date: 10/9/2012 2:23:49 AM | Location : United States







Related Discussions:- The cost benefit analysis (cba) formula, Assignment Help, Ask Question on The cost benefit analysis (cba) formula, Get Answer, Expert's Help, The cost benefit analysis (cba) formula Discussions

Write discussion on The cost benefit analysis (cba) formula
Your posts are moderated
Related Questions
#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to