Explain difference between metrics measures and measurements

Assignment Help Computer Network Security
Reference no: EM131041847

1. Please research cybercrime and post one article that you found, then do a summary of that article. Please comment on two of your classmate's postings. There is no time limit on the crime so it can be recent or in the past. Please ensure your primary posting is completed by Friday so there is sufficient time for each of you to comment on other postings.

2. Please use this conference to provide me your feedback on the courses. What were your experiences regarding the assignments? What did you learn in this class? What areas of the course do you think could be improved?

3. After reading Black, Scarfone, and Souppaya (2008), choose one of the cybersecurity measurement problems discussed by the authors. Explain the problem in your own words and address how and why this problem could impact a cybersecurity focused evaluation of emerging technologies or emerging applications of technologies which are intended for use in a business environment.

Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference:

Black, P. E., Scarfone, K., &Souppaya, M. (2008). Cybersecurity metrics and measures.In J. G. Voller (Ed.) Handbook of science and technology for homeland security (vol. 5). Hoboken, NJ: John Wiley & Sons. Retrieved from https://hissa.nist.gov/~black/Papers/cyberSecurityMetrics2007proof.pdf

4. Read sections 1, 2, and 7 in Bartol, Bates, Goertzel, and Winograd (2009)before attempting to answer this question.

1. Explain in your own words the differences between metrics, measures, and measurements.

2. What types of measures will you need to collect during your proposed technology evaluation?

3. How will you collect these measures? (What actions will be necessary to collect the required data?)
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference: Bartol, N., Bates, B., Goertzel, K. M., &Winograd, T. (2009). Measuring cyber security and information assurance: A state-of-the-art report. Herndon, VA: IATAC. Retrieved from https://buildsecurityin.us-cert.gov/sites/default/files/MeasuringCybersecurityIA.PDF

Reference no: EM131041847

Questions Cloud

Defining square-list this way produces : Unfortunately, defining square-list this way produces the answer list in the reverse order of the one desired. Why? Louis then tries to fix his bug by interchanging the arguments to cons:
How the trading platform works : The website has a 'Learn' tab, which contains information on the basics of forex trading. Please take the time to understand how the trading platform works before commencing your trading activities
Determine appropriate wacc for average-risk : Richard works for a firm that is expanding into a completely new line of business. He has been asked to determine an appropriate WACC for an average-risk project in the expansion division.
Plaintiffs in a class-action product liability lawsuit : The law firm of Dewey, Cheatum & Howe, a general partnership, represents 20 plaintiffs in a class-action product liability lawsuit, with trial scheduled to begin Monday of next week. It will be the biggest trial in the history of the firm, and the pa..
Explain difference between metrics measures and measurements : Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?
United states helped stabilize exchange rates : On June 23, 1997, Japanese Prime Minister Ryutaro Hashimoto spooked Wall Street. At a Columbia University luncheon, he appeared to warn that the Japanese might sell U.S. Treasury bills unless the United States helped stabilize exchange rates. The ..
Question regarding the world competitiveness report : According to the World Competitiveness Report 1994, with freer markets, Third World nations are now able to attract capital and technology from the advanced nations.
Who wants to create a culture of innovation : Suppose that you are the CEO of a technology company who wants to create a culture of innovation. What types of innovative people you need and how do you work with them in order to develop a culture of innovation?
Posting strong economic growth : During the 1990s, Mexico and Argentina went from economic pariahs with huge foreign debts to countries posting strong economic growth and welcoming foreign investment. What would you expect these changes to do to their current-account balances?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  Consequences of the security breach

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

  What are few security compromises that were faced in past

What are the few security compromises that were faced in the recent past due to lack of internet and e-Commerce security competencies?

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  How do these standards reflect a changed environment

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Assignment on secure encrypted communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted.

  Explain some virtues and shortcomings of australian computer

Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

  Case study on computer security

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Create a 7-10 slide presentation on information systems

create a 7-10 slide presentation on information systems security and it infrastructure. you may use various sources

  What are some windows security infrastructure components

How do you measure security? One of the ways is to calculate risk by the formula: R = T x V x A/C.  What are some Windows security Infrastructure components

  Review an article which focuses on the basics of

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Assess any potential malicious attacks and threats

Analyze and assess any potential malicious attacks and threats that may be carried out against the network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd