What are the steps involved in a quantitative assessment?

What will be an ideal response?


A quantitative assessment follows the following process:
Step 1- Identify all objects for assessment. These objects could include various components in the application or host system.
Step 2- Assign a numeric dollar value to each object.
Step 3- Provide a list of major threats posed against each object.
Step 4- Calculate the occurrence of chance per year. This could be done by historical data such as server down time, network provider down time, and so on.
Step 5- Estimate the potential loss in dollars per major threat in each object.
Step 6- Compute the annual loss expectancy (ALE) number. It is occurrence x potential loss.

Computer Science & Information Technology

You might also like to view...

Experts worry that USB flash drives pose a great security risk because people can carry a lot of critical or personal data on them

Indicate whether the statement is true or false

Computer Science & Information Technology

Match the following terms with their description

I. BI II. Digital dashboard III. KPI IV. Data model V. Relational data A. "Big picture" view of the business B. Used to analyze an organization's data C. Collection of tables D. Quantifiable measure E. Examples include a person, place, or event

Computer Science & Information Technology

Which command can be used on a Windows computer to view the IP settings?

A. ip B. ss C. ipconfig D. ifconfig

Computer Science & Information Technology

Which of the following best describes malicious insiders?

a. Theyhack computers in an attempt to promote a political ideology. b. They disrupta company’s information systems and business operations. c. Theyarehired by an organization to test the security of its information systems. d. Theyare hired by an organization to test the security of another organization’s information systems.

Computer Science & Information Technology