Security awareness metrics

Assignment Help Business Management
Reference no: EM131311722

Security Awareness Metrics

Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation. By monitoring, measuring, and assessing the effectiveness of your SAP, you can ensure that the program gets the right information to the right people. As a result, employees will know how to implement the program to keep your organization's information secure. In addition, these measurements can help improve your program by identifying weaknesses and incorporating new techniques and technologies. To get started with this part of the development process, you need to analyze metrics and measurement methods to determine which will work best for your particular situation.

For this Discussion, you will evaluate security metrics based on what you know and have put together for Advanced Topologies, Inc. The "Information Security Metrics: Legal and Ethical Issues" case study from your textbook in this unit's Learning Resources provides information on existing metrics and developing security metrics. 

Post a 350- to 500-word evaluation of the metrics in the case study. Include a description of at least two features of the security awareness plan you developed for Advanced Topologies, along with corresponding metrics that you feel would work well to measure them.  Evaluate the security awareness metrics from the case study and determine which ones you would employ to keep Advanced Topologies on track. Make sure to justify your recommendations.

Readings

  • Whitman, M., & Mattord, H. (2012). High-assurance computing: Topics & case studies. Boston, MA: Course Technology/Cengage Learning.
    • Chapter 7, "Security Management Practices" (pp. 247-274)
      This chapter describes key components and trends in information security management practices. You will examine how organizations meet reciprocal U.S. and international standards of practice.
    • Case 3, "Information Security Metrics: Legal and Ethical Issues" (pp. 399-411)
      In this chapter, you will focus on risk reduction and the development of security measures. You will explore security metrics, case studies, risk management programs, and spheres of control.
  • Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program (NIST Special Publication 800-50). Retrieved from https://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf
    • Chapter 6, "Post-Implementation" (pp. 35-39) 
      This chapter provides a step-wise guide for tasks you will need to perform once an awareness training program has been implemented.

Reference no: EM131311722

Questions Cloud

Explain role asymmetric information has economic transaction : Explain role asymmetric information has in many economic transactions. The Condorcet Paradox and Arrow's Impossibility Theorem in the political economy. People not being rational in behavior economics.
Analyze how it could lead to problems in understanding : Assume there will be a business transaction between yourself and someone from the other country you have selected. You will introduce one similarity and explain how this may be a benefit in this interaction. Then you will introduce one difference ..
Who are looking to automate their accounting : Your accounting firm has been asked to recommend an online accounting system for several businesses who are looking to automate their accounting.
Search for jobs that relate to your career : Search for jobs that relate to your career. Read through several of the job postings and determine what IT skills you need to acquire.
Security awareness metrics : Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation. By monitoring, measuring, and assessing the effectiveness of y..
Describe a situation where that tool would be more effective : Balsamiq and Axureare commercial products that evaluate the design and development process. Select either Balsamig or Axure and describe a situation where that tool would be more effective than the other.
What reinforcers will you use : Design a behavior modification approach that you could use to modify each of the behaviors you discussed in your examples. What reinforcers will you use?Describe three antecedent-based modifications that can be made to the classroom environment th..
Provide a thorough summary of your given article : Provide a thorough summary of your article in 2-3 paragraphs. Lastly provide your thoughts and feeling regarding the topic. Please use the knowledge you have acquired in this course to synthesize, support, and illustrate your opinions.
Has the organization identified key qehs risks : Policy and management commitment: What is the policy? Is it communicated and understood within the organization? Are responsibilities assigned - QEHS manual( or other document which describes the MS): How is the MS documented within the organization..

Reviews

Write a Review

Business Management Questions & Answers

  Participative leadership style

Communication is key, and team members must be willing to set performance expectations for each member in order to add accountability (Adams, 2015). Successful self-managed work teams typically have a participative leadership style.

  For the leadership dares the focus will be on corporations

for the leadership dares the focus will be on corporations as well as their leaders that have been in crisis. a list of

  Features of exempt and non-exempt employee status

Compare and contrast the features of exempt and non-exempt employee status in a table format. Speculate how employers benefit from having one type or another. Develop a recommendation for your organization about how to increase the probability tha..

  Which variables must your firm use to segment its target

Which variables must your firm use to segment its target markets? How can your firm assess the attractiveness of each identified segment?

  Set of all pareto optimal allocations

The total endowment of good X equals the total endowment of good Y. Alice's utility function is UA(xA,yA) = min{xA,yA} and Bob's utility function is UB(xB,yB) = max{xB,yB}. In an Edgeworth box, what would be the set of all Pareto optimal allocatio..

  Explain what challenges or barriers may happen

Explain What challenges or barriers may happen and How will the best strategy be determined and What measures will you use to determine if the team is operating successfully

  What is your biggest concern about that mnes operation

Identify a foreign MNE, big or small, that is operating in your area.- Of the concerns outlined in this section, what is your biggest concern about that MNE's operation?

  Explain the sba and other expert organizations encourage

Explain the SBA and other expert organizations encourage you to go ahead with your plans because if you understand the market

  Problem regarding the wiley construction

The Senior Seminar at Allegheny State requires students to complete a process improvement project with local industry. Jim Davis and Leanna Hearn have been assigned to Wiley Construction. Here is their report.

  Purchasing and supply manager educationbased on your

purchasing and supply manager educationbased on your experience or readings discuss the role of higher education and

  Legal and accepted accounting practices

Sometimes there is intentional deception or fraud. Yet, even when an organization uses legal and accepted accounting practices, financial statements may fail to present risks or explain unusual costs, profits, or assumptions.

  Assumption of the model of perfect competition

1. An assumption of the model of perfect competition is: 2. Which of the following is true in a perfectly competitive market?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd