Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Microeconomics Expert

Assignment: Security Awareness Metrics

Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation. By monitoring, measuring, and assessing the effectiveness of your SAP, you can ensure that the program gets the right information to the right people. As a result, employees will know how to implement the program to keep your organization's information secure. In addition, these measurements can help improve your program by identifying weaknesses and incorporating new techniques and technologies. To get started with this part of the development process, you need to analyze metrics and measurement methods to determine which will work best for your particular situation.

For this Discussion, you will evaluate security metrics based on what you know and have put together for Advanced Topologies, Inc. The "Information Security Metrics: Legal and Ethical Issues" case study from your textbook in this unit's Learning Resources provides information on existing metrics and developing security metrics.

Post a 350- to 500-word evaluation of the metrics in the case study. Include a description of at least two features of the security awareness plan you developed for Advanced Topologies, along with corresponding metrics that you feel would work well to measure them. Evaluate the security awareness metrics from the case study and determine which ones you would employ to keep Advanced Topologies on track. Make sure to justify your recommendations.

Readings

• Whitman, M., & Mattord, H. (2012). High-assurance computing: Topics & case studies. Boston, MA: Course Technology/Cengage Learning.

• Chapter 7, "Security Management Practices" (pp. 247-274)

This chapter describes key components and trends in information security management practices. You will examine how organizations meet reciprocal U.S. and international standards of practice.

• Case 3, "Information Security Metrics: Legal and Ethical Issues" (pp. 399-411)

In this chapter, you will focus on risk reduction and the development of security measures. You will explore security metrics, case studies, risk management programs, and spheres of control.

• Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program (NIST Special Publication 800-50). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf

• Chapter 6, "Post-Implementation" (pp. 35-39)

This chapter provides a step-wise guide for tasks you will need to perform once an awareness training program has been implemented.

Microeconomics, Economics

  • Category:- Microeconomics
  • Reference No.:- M92199989
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Microeconomics

Question purpose of assignmentthis assignment will help

Question: Purpose of Assignment This assignment will help students master research and other analytical skills and will help students recognize reasons why economic growth varies by country. By using macroeconomic indica ...

Question the european central bank the ecb buys bonds on

Question: The European Central Bank (the ECB) buys bonds on the open market (from commercial banks). a) Assume that banks In the eurozone initially have no excess reserves. What is the effect of the central bank's action ...

Question despite airport precautions x hijacked an airplane

Question: Despite airport precautions, X hijacked an airplane in Chicago and forced the pilot, crew, and passengers to fly to New York. Upon reaching New York, X shot the pilot before giving up and surrendering to the Ne ...

Quesiton the firms demand for labor is a derived demanda

Quesiton: The firm's demand for labor is a derived demand. A. Explain the law of diminishing marginal returns and show graphically how it affects labor demand curves. B. Explain and show graphically why the marginal reve ...

Question your executive team has asked you to be a mentor

Question: Your executive team has asked you to be a mentor for a new MBA graduate who was assigned to accompany you on your next trip to Asia. As you begin your discussion with the new graduate, you sense that there are ...

Question - recently an internet service provider isp in the

Question - Recently, an Internet Service Provider (ISP) in the UK implemented a "no-strings US-style flat-rate plan" whereby its commercial subscribers can send and receive unlimited volume (measured in gigabytes) up to ...

Question 1 what is the key difference between the models

Question: 1. What is the key difference between the model's parameters and endogenous variables? 2. What is the difference between endogenous and exogenous variables? The response must be typed, single spaced, must be in ...

Question draw a circular flow model showing how specific

Question: Draw a circular flow model showing how specific resources are exchanged in EACH of two scenarios below: 1) Microeconomic Scenario: show how the Circular Flow model works in your personal life. You are the House ...

Question what are the assumptions of the monopolistic

Question: What are the assumptions of the Monopolistic Competition Model? Even if there exist same number of consumers, same technology and cost curves and the same number of firms in the no-trade equilibrium both at HOM ...

Question according to legislation as of late 2002 the death

Question: According to legislation as of late 2002, the death tax (estate tax) is supposed to be fully phased out by the year 2010, but then reinstated at a maximum 55% rate in 2011. In terms of the LCH, how would these ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As