Design an information security metrics

Assignment Help Basic Computer Science
Reference no: EM131060741

Question 1. What weaknesses in ChoicePoint Information Security Management practices likely contributed to their data breach? Please explain how they contributed and what Choice Point could do to strengthen these areas.

Question 2. Discuss the pros and cons of two information security management models that would be appropriate for ChoicePoint to implement? Explain the strengths and weaknesses of each model within the context of Choice Point's business model.

Question 3. Design an information security metrics program that would provide ChoicePoint executives with visibility into the effectiveness of the security program in preventing future data breaches. What information security metrics would you recommend and why?

Question 4. What are the key risk areas that ChoicePoint (and the data broker industry) as a whole need to address to protect its information and to minimize the negative perception (and the resultant likelihood of restrictive laws being passed) of the industry as a whole?

Question 5. To what extent did each of the following three areas (technology, people, process) play in the ChoicePoint data breach? Explain.

  • Choicepoint (A)
  • Author(s): Lynn Paine, Zack Phillips
  • Product Number: 306001
  • Publication Date: Feb 10, 2006
  • Publisher: Harvard Business School Publishing

Reference no: EM131060741

Questions Cloud

Compute the fourier coefficients for the fourier series : MAST20029 Engineering Mathematics Assignment. Use MATLAB to help compute the Fourier coefficients bn for the Fourier series F(t). Give your answer as a simplified expression for bn in terms of n
Determine the orientation of the neutral axis : Determine the orientation of the neutral axis and calculate the maximum tensile stress σt and maximum compressive stress σc in the beam. Use the following numerical data: height h= 200 mm, width b 90 mm, constant thickness t = 15 mm, and θp= 19.2°..
Describe how you will evaluate effectiveness of your program : Provide a sample of an evaluation tool that you have developed or modified. Discuss how you will know if your program or intervention is effective. Refer back to your program goal and objectives.
Assume no servicing fees and prepayment : Assume no servicing fees and prepayment=CPR 10%. A CMO is being issued with 3 tranches. The A tranche will consist of $100M of principal and have a coupon of 5%. The B tranche will have a coupon of 5.75% and a principal of $57.5M. The Z tranche will ..
Design an information security metrics : Design an information security metrics program that would provide ChoicePoint executives with visibility into the effectiveness of the security program in preventing future data breaches. What information security metrics would you recommend and w..
Calculate the best-case and worst-case npv figures : We are evaluating a project that costs $1,160,000, has a ten-year life, and has no salvage value. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 44,000 units per year. Calculate the best-case an..
Discuss ways in which humans have changed florida ecosystem : Discuss five ways in which humans have changed Florida's ecosystem.
Average real return and average nominal risk premium : You’ve observed the following returns on Crash-n-Burn Computer’s stock over the past five years: 12 percent, –12 percent, 19 percent, 24 percent, and 10 percent. What was the average real return on Crash-n-Burn’s stock? What was the average nominal r..
Performance improvement : Why are accreditation, certification, and licensure important for the health care facility? In your response explain the performance improvement perspectives of accreditation, certification, and licensure of the organizations. Be sure to justify y..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe what physical, logical and port addresses

With respect to TCP/IP; a) Describe what physical, logical and port addresses are and why they are required. b) Provide a real example of a physical, logical and port address - this should be from your own computer on your own network, or a lab co..

  The myths of innovation

1. Scott Berkun's book, The Myths of Innovation, holds that many of the popular images of how innovation works do not hold up when scrutinized closely. He examines ten innovation stereotypes, and demonstrates how they generally do not hold true.

  Securing owa

In order to effectively implement Outlook Web Access (OWA) and allow employees to have seamless access to email, you must provide external access to users. This, of course, creates a security weakness in your network because of open ports. Your senio..

  Process of encoding and decoding messages

Symmetric encryption is the process of encoding and decoding messages using the same key. An important aspect of this type encryption is to ensure that the key is not compromised and that only the sender and receiver have access to the key used t..

  Describe possible standards that might be used for

Reports which might be submitted for a term project in a university;

  Memory segment in terms of its start address

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (contains a pointer to next segment descriptor). Initially, there is only one se..

  Engineers for use by scientists and engineers

What is the name of the operating system which was originally designed by scientists and engineers for use by scientists and engineers?

  Determine the minimum distance d

If the coefficient of static friction at the contact points A and B is µs = 0.4 , determine the minimum distance d where a 75-lb girl can stand on the plank without causing it to slip. Neglect the weight of the plank.

  How many instructions can the processor execute

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Internal network address to incorporate variable length

·Change the internal network address to incorporate variable-length subnet mask (VLSM) with EIGRP routing protocol. ·Set up all of the accountants on a separate VLAN. ·Create a VPN connection to allow accountants to access the accounting database f..

  Purpose and goals of the mobile self-service

Elaborate on the guidelines for how the self-service Website can be kept current as newer mobile devices are being introduced at a rapid rate and the design of the Website for mobile devices and the interfaces that are applicable to the mobile devic..

  Research the speculations on where the state-of-the-art

Research the speculations on where the state-of-the-art will be in the near future for one of the following technologies. Your paper should include a description of the state-of-the-art in your technology, a discussion of where the sources that..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd