Verified Document

Security Has Become Critical In Almost All Essay

¶ … security has become critical in almost all business functions since it can ensure that organizations conduct their businesses and deliver services to the public without any fear of threats or sabotage. The push towards securing organizational information has resulted in the need for developing better metrics for comprehending the actual state of a given organization's security infrastructure (Seddigh et al.,2004).The work of Vaugh, Henning and Siraj (2009,p.9) noted that the adoption of metrics or measures for reliable depiction of the information assurance level that is associated with a given software and hardware system is one of the unresolved problems in the field of security engineering.. In this paper, we evaluate whether devising metrics can really work for Information Assurance programs. We also find out if there is a need for taking additional steps in making sure that the metrics we are using are really measuring our IA programs and strategy. The need for information assurance measures and metrics

The concepts of metrics and measures in regard to information assurance...

This means making IA a concept that ca be instrumented or measured (Henning et al.,2008). This approach can allows for a system's information assurance properties to be analyzed in a similar way in which the traditional software complexity, productivity measures as well as test case coverage is done. Information assurance must take into account information security, the quality of services as well as system availability. These measures and metrics can be treated as performance measures that are used in quantifying the effectiveness of a given organization's information security infrastructure. The work of Chew et al. (2006, p.10) defined the concept of performance measures as the indicators, metrics and statistics that are used in gauging the performance of a given program.
Can devising metrics really work?

The answer this question is no. This is because there is not a single successful metric or measure that can be used to quantify the level of assurance that exists in a given system (Vaugh, Henning…

Sources used in this document:
References

Chew, E., Clay, A., Hash, J., Bartol, N., & Brown, A. (2006). Guide for developing performance metrics for information security: Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: U.S. Dept. Of Commerce, Technology Administration, National Institute of Standards and Technology. Retrieved October 23rd, 2012 from http://permanent.access.gpo.gov/lps72067/draft-sp800-80-ipd.pdf

Henning, RR et al. (2000) Information Assurance Metrics: Prophecy, Process, or Pipedream-Available online at http://csrc.nist.gov/nissc/2000/proceedings/papers/201.pdf

Seddigh, N et al. (2004).Current Trends and Advances in Information Assurance Metrics. Available online at http://solananetworks.com/documents/PST2004.pdf

Vaughn, RB., Henning, R., Siraj.,A (2003).Information Assurance Measures and Metrics- State of Practice and Proposed Taxonomy. Proceedings of the 36th Hawaii International Conference on System Sciences -- 2003
Cite this Document:
Copy Bibliography Citation

Related Documents

Security and Governance Program Is "A Set
Words: 1539 Length: 5 Document Type: Term Paper

security and governance program is "a set of responsibilities and practices that is the responsibility of the Board and the senior executives." This is the procedures by which the company ensures information security in the organization. The program consists of desired outcomes, knowledge of the information assets, and process integration (ITGI, 2013). Security of information is important because of the value of information, especially proprietary, in today's business world.

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Aviation Security Pre and
Words: 10540 Length: 30 Document Type: Term Paper

With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now