The cost benefit analysis (cba) formula, Computer Network Security

The Cost Benefit Analysis (CBA) Formula

CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily calculated by using ALE from earlier assessments, before implementation of control proposed:

- CBA = ALE (prior) – ALE (post) – ACS
- ALE (prior) is annualized loss expectancy of risk before implementation of control
- ALE (post) is estimated ALE based on control being in place for the period of time
- ACS is annualized cost of safeguard.

Posted Date: 10/9/2012 2:23:49 AM | Location : United States

Related Discussions:- The cost benefit analysis (cba) formula, Assignment Help, Ask Question on The cost benefit analysis (cba) formula, Get Answer, Expert's Help, The cost benefit analysis (cba) formula Discussions

Write discussion on The cost benefit analysis (cba) formula
Your posts are moderated
Related Questions

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Question : Wi-Fi protected access (WPA) was specified by the Wi-Fi alliance with the primary aim of enhancing the security of existing 802.11 networks. However, WPA was only a

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,