Explain difference between metrics measures and measurements

Assignment Help Computer Network Security
Reference no: EM131041847

1. Please research cybercrime and post one article that you found, then do a summary of that article. Please comment on two of your classmate's postings. There is no time limit on the crime so it can be recent or in the past. Please ensure your primary posting is completed by Friday so there is sufficient time for each of you to comment on other postings.

2. Please use this conference to provide me your feedback on the courses. What were your experiences regarding the assignments? What did you learn in this class? What areas of the course do you think could be improved?

3. After reading Black, Scarfone, and Souppaya (2008), choose one of the cybersecurity measurement problems discussed by the authors. Explain the problem in your own words and address how and why this problem could impact a cybersecurity focused evaluation of emerging technologies or emerging applications of technologies which are intended for use in a business environment.

Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference:

Black, P. E., Scarfone, K., &Souppaya, M. (2008). Cybersecurity metrics and measures.In J. G. Voller (Ed.) Handbook of science and technology for homeland security (vol. 5). Hoboken, NJ: John Wiley & Sons. Retrieved from https://hissa.nist.gov/~black/Papers/cyberSecurityMetrics2007proof.pdf

4. Read sections 1, 2, and 7 in Bartol, Bates, Goertzel, and Winograd (2009)before attempting to answer this question.

1. Explain in your own words the differences between metrics, measures, and measurements.

2. What types of measures will you need to collect during your proposed technology evaluation?

3. How will you collect these measures? (What actions will be necessary to collect the required data?)
Post your analysis as 250+ word response to this message. Include APA format citations and references as appropriate to the information used and the sources from which you obtained that information.

Reference: Bartol, N., Bates, B., Goertzel, K. M., &Winograd, T. (2009). Measuring cyber security and information assurance: A state-of-the-art report. Herndon, VA: IATAC. Retrieved from https://buildsecurityin.us-cert.gov/sites/default/files/MeasuringCybersecurityIA.PDF

Reference no: EM131041847

Questions Cloud

Defining square-list this way produces : Unfortunately, defining square-list this way produces the answer list in the reverse order of the one desired. Why? Louis then tries to fix his bug by interchanging the arguments to cons:
How the trading platform works : The website has a 'Learn' tab, which contains information on the basics of forex trading. Please take the time to understand how the trading platform works before commencing your trading activities
Determine appropriate wacc for average-risk : Richard works for a firm that is expanding into a completely new line of business. He has been asked to determine an appropriate WACC for an average-risk project in the expansion division.
Plaintiffs in a class-action product liability lawsuit : The law firm of Dewey, Cheatum & Howe, a general partnership, represents 20 plaintiffs in a class-action product liability lawsuit, with trial scheduled to begin Monday of next week. It will be the biggest trial in the history of the firm, and the pa..
Explain difference between metrics measures and measurements : Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?
United states helped stabilize exchange rates : On June 23, 1997, Japanese Prime Minister Ryutaro Hashimoto spooked Wall Street. At a Columbia University luncheon, he appeared to warn that the Japanese might sell U.S. Treasury bills unless the United States helped stabilize exchange rates. The ..
Question regarding the world competitiveness report : According to the World Competitiveness Report 1994, with freer markets, Third World nations are now able to attract capital and technology from the advanced nations.
Who wants to create a culture of innovation : Suppose that you are the CEO of a technology company who wants to create a culture of innovation. What types of innovative people you need and how do you work with them in order to develop a culture of innovation?
Posting strong economic growth : During the 1990s, Mexico and Argentina went from economic pariahs with huge foreign debts to countries posting strong economic growth and welcoming foreign investment. What would you expect these changes to do to their current-account balances?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd