Explain difference between metrics measures and measurements

Assignment Help Computer Network Security
Reference no: EM131041847

1. Please research cybercrime and post one article that you found, then do a summary of that article. Please comment on two of your classmate's postings. There is no time limit on the crime so it can be recent or in the past. Please ensure your primary posting is completed by Friday so there is sufficient time for each of you to comment on other postings.

2. Please use this conference to provide me your feedback on the courses. What were your experiences regarding the assignments? What did you learn in this class? What areas of the course do you think could be improved?

3. After reading Black, Scarfone, and Souppaya (2008), choose one of the cybersecurity measurement problems discussed by the authors. Explain the problem in your own words and address how and why this problem could impact a cybersecurity focused evaluation of emerging technologies or emerging applications of technologies which are intended for use in a business environment.

Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference:

Black, P. E., Scarfone, K., &Souppaya, M. (2008). Cybersecurity metrics and measures.In J. G. Voller (Ed.) Handbook of science and technology for homeland security (vol. 5). Hoboken, NJ: John Wiley & Sons. Retrieved from https://hissa.nist.gov/~black/Papers/cyberSecurityMetrics2007proof.pdf

4. Read sections 1, 2, and 7 in Bartol, Bates, Goertzel, and Winograd (2009)before attempting to answer this question.

1. Explain in your own words the differences between metrics, measures, and measurements.

2. What types of measures will you need to collect during your proposed technology evaluation?

3. How will you collect these measures? (What actions will be necessary to collect the required data?)
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference: Bartol, N., Bates, B., Goertzel, K. M., &Winograd, T. (2009). Measuring cyber security and information assurance: A state-of-the-art report. Herndon, VA: IATAC. Retrieved from https://buildsecurityin.us-cert.gov/sites/default/files/MeasuringCybersecurityIA.PDF

Reference no: EM131041847

Questions Cloud

Defining square-list this way produces : Unfortunately, defining square-list this way produces the answer list in the reverse order of the one desired. Why? Louis then tries to fix his bug by interchanging the arguments to cons:
How the trading platform works : The website has a 'Learn' tab, which contains information on the basics of forex trading. Please take the time to understand how the trading platform works before commencing your trading activities
Determine appropriate wacc for average-risk : Richard works for a firm that is expanding into a completely new line of business. He has been asked to determine an appropriate WACC for an average-risk project in the expansion division.
Plaintiffs in a class-action product liability lawsuit : The law firm of Dewey, Cheatum & Howe, a general partnership, represents 20 plaintiffs in a class-action product liability lawsuit, with trial scheduled to begin Monday of next week. It will be the biggest trial in the history of the firm, and the pa..
Explain difference between metrics measures and measurements : Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?
United states helped stabilize exchange rates : On June 23, 1997, Japanese Prime Minister Ryutaro Hashimoto spooked Wall Street. At a Columbia University luncheon, he appeared to warn that the Japanese might sell U.S. Treasury bills unless the United States helped stabilize exchange rates. The ..
Question regarding the world competitiveness report : According to the World Competitiveness Report 1994, with freer markets, Third World nations are now able to attract capital and technology from the advanced nations.
Who wants to create a culture of innovation : Suppose that you are the CEO of a technology company who wants to create a culture of innovation. What types of innovative people you need and how do you work with them in order to develop a culture of innovation?
Posting strong economic growth : During the 1990s, Mexico and Argentina went from economic pariahs with huge foreign debts to countries posting strong economic growth and welcoming foreign investment. What would you expect these changes to do to their current-account balances?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Temporary assistance for needy families

TANF is the public program responsible for offering cash assistance to low-income families with children. However, the sector has been challenged by numerous laws and limitations as to how the industry carries on it functions.

  Name and explain 4 key security tips you would share with

question 1 name and describe 4 key security tips you would share with your coworkers to keep their data safe their

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Explain roles and responsibilities of information technology

Explain the roles and responsibilities of an information technology department to support an organization's IT strategy.

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Logical and physical topographical layout of planned network

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Role of planning when developing a cybersecurity strategy

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition.

  What would the hash value of the modified file look like

Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file.

  Overview of cybersecurity framework

Look at the overviews of CobIT, ISO 27001, and the NIST cybersecurity framework How are they similar - How are they different? Which would you feel is more effective if you were selecting which one to use in an organization?

  Evaluate software solutions to security problems

Security is a major concern for many mission-critical applications.  The focus of the assignment is specifically on protocols that contain known vulnerabilities.

  Mobile computing and social networking

Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd