Developing operational security metrics to meet business

Assignment Help Basic Computer Science
Reference no: EM131095656

Developing Operational Security Metrics to Meet Business Value

Identity management is just one area of information assurance that needs to be improved in an organization. An information assurance professional needs to have a good understanding of how well all areas of security and information assurance are being managed and maintained. Metrics are very important instruments for managing security and information assurance. Examples of metrics from other areas of security that can be more quantitative and meaningful include:

  • Tracking the number of security intrusion detection incidents on a monthly basis
  • Breaking intrusion detection incidents down by unit and country because this will demonstrate if security is weak in some functional area
  • Recording the business impact of each intrusion detection incident

For this Project, write a 4- to 6-page paper in which you create 8-10 operational metrics, and explain how these metrics demonstrate the overall efficacy of the information assurance program at your organization. In the paper, respond to the following: 

  • How do you determine acceptable baselines for the metrics you created?
  • How are these metrics efficacious to the teams involved in the operation of security controls?

Because you are using a fictitious scenario, state any assumptions you make.

Include references and make your work original as possible.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 13, "Security Program Development Metrics"
      In this chapter you are introduced to the process of putting an information system security strategy into operational use. You will explore the decisions that must be made and metrics that will be needed to provide the information required for security program development management.
    • Chapter 14, "Information Security Management Metrics"
      In this chapter you are introduced to the concept of using management metrics to help executive management of an organization with decision support regarding information security. You will investigate the tactical metrics that are needed to keep the information security governance program operating at an acceptable level guided by the strategic objectives.
  • Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt.  Upper Saddle River, NJ: Pearson.
    • Chapter 3, "Diagnosing Problems and Measuring Technical Security"
      In this chapter you will be introduced to a collection of common security metrics for diagnosing problems and measuring technical security activities.
    • Chapter 6, "Visualization"
      In this chapter you are introduced to the concept of graphically representing data and metrics as an information visualization practice. You will explore ways to display data graphically without losing the richness and texture that best facilitate deep understanding.

Reference no: EM131095656

Questions Cloud

Compare and contrast the four motivation theories : discuss the criticism of each theory. Which theory you identify with the most and why? You can identify with more than one, but it is not required. Development of idea and grammar.
Different types of correspondence in the workplace : You are working as the communications officer for a company located in a large office building with designated areas for employee breaks and lunches, located on each floor.
Security and compliance : Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.
Identify your current strategy for coping with stress : Write a summary defining stress and stressors. Explain the relationship between stress and physiological as well as psychological health. Discuss how you rated on the stress inventory - be specific. Then, identify the specific stressors in your lif..
Developing operational security metrics to meet business : Identity management is just one area of information assurance that needs to be improved in an organization. An information assurance professional needs to have a good understanding of how well all areas of security and information assurance are be..
Small consulting company is planning to make deposits : A small consulting company is planning to make deposits such that each one is 3% larger than the preceding one. What is the annual equivalent of this cash flow if the company makes 12 deposits and the interest rate is 8%? The first deposit is $7,000 ..
Find total reserves minus vault cash : Total Reserves minus vault cash equals- bank deposits with the Fed. excess reserves. currency in circulation.  required reserves
Specific data warehouse product : While this case study supports a specific data warehouse product, please locate another case study from another data warehousing software company and explain the data warehouse that was designed in that case study?
Guidelines for creating graphic aids : Make the graphic large enough for everyone to see easily-even people sitting In the back or the corners of the room. Do not crowd numbers or images on a graphic aid.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd