Explain the cost benefit analysis method you use

Assignment Help Computer Network Security
Reference no: EM132784737

CIS222 Fundamentals of Security

The Chief Financial Officer (CFO) made some complaints to the CEO regarding recent capital expenditures for security software. You try to lighten the blow by explaining the value of controlling security.

In a point paper to the CEO, explain the cost benefit analysis method you use to do a quantitative assessment before investing in a security control.

Complete and include the table below in your paper.

Historical PCS incidents

Cost per Incident

Frequency of Occurrence

SLE

ARO

ALE

Theft of information (hacker)

$25,500

1 every 5 years

25,500

.2


Theft of information (employee)

$50,000

1 every 2 years

50,000

.5


Web defacement

$500

1 per month


12.0

 $6,000

Theft of equipment

$5,000

1 per year


1.0

 $5,000

Virus, worms, Trojan horses

$1,500


1,500

52.0

 $78,000

Denial-of-service attacks

$2,500


2,500

4.0

 $10,000

You are currently deciding whether to invest in data loss prevention software. You have some reliable statistics that the software will reduce your information theft incidents by half of the current values. The cost of the software is $100K per year. Recalculate the new ARO and ALE for hacker and employee information theft. Based on these new values, explain your decision whether or not to invest in the Data Loss Prevention Software.

Projected PCS incidents with Data Theft Prevention Software

Cost per Incident

Frequency of Occurrence

SLE

ARO

ALE

Theft of information (hacker)

$25,500

1 every 5 years

25,500

 


Theft of information (employee)

$50,000

1 every 2 years

50,000

 


The requirements for your assignment are:

• 2-3 page APA paper excluding title and reference pages
• Provide at least two references and in-text citations in APA format
• College level writing

Attachment:- Fundamentals of Security.rar

Verified Expert

This solution is about quantitative analysis, which involves analysis of possible risks in a business. This analysis method uses methods of determining the ALE (Annual Loss Expectancy) using the SLE (Single Loss Expectancy ) and the ARO (Annual Rate of Expectancy) to calculate the possible effect of a certain decision and how to prevent possible loss in businesses. calculating the ALE helps businesses to make accurate decisions about their need for investments.

Reference no: EM132784737

Questions Cloud

What will you do when he demands that this revenue : You like their music and enjoy the free tickets supplied to you. What will you do when he demands that this revenue not be included
What is cost of marginal investment in accounts receivable : The firm's required return on equal-risk investments is 20 percent. What is the cost of marginal investment in accounts receivable under the proposed plan?
What is the purpose of having a style guide : 1. What is the purpose of having a style guide? 2. List three examples of information that could be included in a style guide.
Calculate the profit margin on sales : The following information relating to the financial results of a company is given below: Net sales $74,331. Calculate the profit margin on sales
Explain the cost benefit analysis method you use : Explain the cost benefit analysis method you use to do a quantitative assessment before investing in a security control.
What is a leveraged buyout : What is a leveraged buyout (LBO)? How does an LBO compare to a management buyout (MBO)? Is a LBO a type of business combination? Explain.
What responsibility does the health care organization have : Julie is a 35-year-old with bipolar II disorder. After her third child was born, she had a severe depressive episode. She attempted suicide by taking 25 Xanax.
List three key features of using styles : 1. Discuss three uses of formatting to improve the appearance and readability of a document.
Discuss the facts and circumstances surrounding the case : Prepare a PowerPoint presentation on one of the topics below. Your PowerPoint presentation should examine and discuss the facts and circumstances surrounding.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd