Developing operational security metrics to meet business

Assignment Help Basic Computer Science
Reference no: EM131095656

Developing Operational Security Metrics to Meet Business Value

Identity management is just one area of information assurance that needs to be improved in an organization. An information assurance professional needs to have a good understanding of how well all areas of security and information assurance are being managed and maintained. Metrics are very important instruments for managing security and information assurance. Examples of metrics from other areas of security that can be more quantitative and meaningful include:

  • Tracking the number of security intrusion detection incidents on a monthly basis
  • Breaking intrusion detection incidents down by unit and country because this will demonstrate if security is weak in some functional area
  • Recording the business impact of each intrusion detection incident

For this Project, write a 4- to 6-page paper in which you create 8-10 operational metrics, and explain how these metrics demonstrate the overall efficacy of the information assurance program at your organization. In the paper, respond to the following: 

  • How do you determine acceptable baselines for the metrics you created?
  • How are these metrics efficacious to the teams involved in the operation of security controls?

Because you are using a fictitious scenario, state any assumptions you make.

Include references and make your work original as possible.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 13, "Security Program Development Metrics"
      In this chapter you are introduced to the process of putting an information system security strategy into operational use. You will explore the decisions that must be made and metrics that will be needed to provide the information required for security program development management.
    • Chapter 14, "Information Security Management Metrics"
      In this chapter you are introduced to the concept of using management metrics to help executive management of an organization with decision support regarding information security. You will investigate the tactical metrics that are needed to keep the information security governance program operating at an acceptable level guided by the strategic objectives.
  • Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt.  Upper Saddle River, NJ: Pearson.
    • Chapter 3, "Diagnosing Problems and Measuring Technical Security"
      In this chapter you will be introduced to a collection of common security metrics for diagnosing problems and measuring technical security activities.
    • Chapter 6, "Visualization"
      In this chapter you are introduced to the concept of graphically representing data and metrics as an information visualization practice. You will explore ways to display data graphically without losing the richness and texture that best facilitate deep understanding.

Reference no: EM131095656

Questions Cloud

Compare and contrast the four motivation theories : discuss the criticism of each theory. Which theory you identify with the most and why? You can identify with more than one, but it is not required. Development of idea and grammar.
Different types of correspondence in the workplace : You are working as the communications officer for a company located in a large office building with designated areas for employee breaks and lunches, located on each floor.
Security and compliance : Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.
Identify your current strategy for coping with stress : Write a summary defining stress and stressors. Explain the relationship between stress and physiological as well as psychological health. Discuss how you rated on the stress inventory - be specific. Then, identify the specific stressors in your lif..
Developing operational security metrics to meet business : Identity management is just one area of information assurance that needs to be improved in an organization. An information assurance professional needs to have a good understanding of how well all areas of security and information assurance are be..
Small consulting company is planning to make deposits : A small consulting company is planning to make deposits such that each one is 3% larger than the preceding one. What is the annual equivalent of this cash flow if the company makes 12 deposits and the interest rate is 8%? The first deposit is $7,000 ..
Find total reserves minus vault cash : Total Reserves minus vault cash equals- bank deposits with the Fed. excess reserves. currency in circulation.  required reserves
Specific data warehouse product : While this case study supports a specific data warehouse product, please locate another case study from another data warehousing software company and explain the data warehouse that was designed in that case study?
Guidelines for creating graphic aids : Make the graphic large enough for everyone to see easily-even people sitting In the back or the corners of the room. Do not crowd numbers or images on a graphic aid.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Unix uses many commands in its operating system

Question 1: UNIX uses many commands in its operating system. Research on the web at least 2 more commands describe their function and discuss similar commands in Windows operating system.

  Determine the delays of the carry out bit c48

Determine the delays of the carry out bit c48 and the gate complexity, i.e, the numbers of AND, OR and XOR gates needed for implementing the following 48-bit adders.

  Run make to build the executable

Copy the directory lab5 from the cis18b directory. This is the directory where you will do your work for Module 5 lab. In this directory are some source files that work together to allow the user to multiply 2 integers (yes, the code is a no-brain..

  Use the encase software or digital forensics framework

Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations ..

  Determining privacy policy for organization

Many countries need organizations which gather personal information to publish privacy policy. Determine a copy of the privacy policy for an organization.

  Example of a working virtual circuit whose path traverses

Packets sent along this path should not, however, circulate indefinitely.

  How many inherited classes are defined in the code

1. Which function(s) is/are being overloaded on the code? (Check all that apply) *  void sort(int A[], int size)  bool testIfSorted(int A[], int size)  long getNumCmps()

  Describe the same task using intelligent software agents

Describe the same task using intelligent software agents

  Discuss and explain web browser vulnerabilities

Discuss and explain Web browser vulnerabilities. Include at least two different Web browsers in your discussion.

  How would their limits be set

How would their limits be set?

  A list of n+1 integers between 1 and n

Let's say you have a list of N+1 integers between 1 and N. You know there's at least one duplicate, but there might be more. For example, if N=3, your list might be 3, 1, 1, 3 or it might be 1, 3, 2, 2. Print out a number that appears in the list mor..

  Input and output devices of a computer

Write a one page paper in APA format on the input and output devices of a computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd