Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

An organization determines that the probability of unauthorized access to a database that contains personally identifiable information (PII) about its clients and employees is 5% in a year.

The total estimate of the loss due to this exposure is estimated to be 5 million dollars. This includes losses resulting from loss of reputation, business operations, fines imposed by FCC, legal fees.

After consulting with a security firm, a product was identified that could implement stronger access control and that could allow security administrator to track such an unauthorized access.

The total cost of the product is $500,000, plus $10,000/year for maintenance.

The product should work well for next five years. It is estimated that, if implemented, it will protect from 90% of all such attacks.

We want to know whether the organization should purchase this product.

1. What is the Single Loss Expectancy (SLE)? $ (Please enter digits only)

2. What is the Annualized Rate of Occurrence (ARO)? %

3. What is the calculated Annualized Loss Expectancy (ALE)? $ (Please enter digits only)

4. What would be the ARO if the countermeasure is implemented? %

5. What would be the corresponding ALE? $ (Please enter digits only)

6. What is the countermeasure cost for a year? $ (Please enter digits only)

7. Should the organization purchase this product? (Please enter Yes or No)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93073282

Have any Question?


Related Questions in Computer Engineering

The researchers stated that there were no significant

The researchers stated that there were no significant differences in the baseline characteristics of the intervention and control groups. Are these groups heterogeneous or homogeneous at the beginning of the study? Why i ...

Question you have been asked to help promote a new bill in

Question: You have been asked to help promote a new bill in your state, to which there is much opposition to this bill. Discuss what distributive bargaining is. Discuss the pros and cons which might arise toward the pass ...

At a certain temp the kp for the decomposition of h2s is

At a certain temp, the Kp for the decomposition of H2S is .883. H2S (g) ----> H2(g) + S (g) Initially, only H2S is present at a pressure of  .181 atm  in a closed container. What is the total pressure in the container at ...

Qion leadership paradox and inter-team relationsa

Question: Leadership Paradox and Inter-team Relations A. What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Su ...

The economic dynamism which is the index of productive

The economic dynamism, which is the index of productive growth in dollars for countries that are designated by the World Bank as middle-income are in table #8.3.9 ("SOCR data 2008," 2013). Compute a 95% confidence interv ...

Question need two different postsresponses with 200 words

Question: Need two different posts(responses) with 200 words each on the below topic. Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:(Wikipedia ar ...

What is a survey and pros and cons of using this method to

What is a Survey and pros and cons of using this method to collect data are? Have you done a survey? How successful were your results?

Exercise identifying technology assets1 you are part of

Exercise: Identifying Technology Assets: 1. You are part of disaster recovery team charged with completing the asset inventory at a small business primarily sells a small selection of products to the public. 2. Establish ...

Objectiveto apply object-oriented methodology for analysis

Objective To apply object-oriented methodology for analysis of information systems development in a case study. Case Study -Chemist ServiceGroup Chemist Service group is a chainof chemiststores. It employs more than8,000 ...

Explain that our ability to secure each computers stored

Explain that our ability to secure each computers stored information is now influenced by the security on each computer to which it is connected

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As