Question: a . Apply the following data to evaluate the time - based model of security for the XYZ Company. Does the XYZ Company satisfy the
a Apply the following data to evaluate the timebased model of security for the XYZ Company. Does the XYZ Company satisfy the requirements of the timebased model of security? Why?
Estimated time for intruder to successfully penetrate system minutes
Estimated time to detect an intrusion attempt and notify appropriate security staff minutes in bestcase scenario; minutes in worstcase
scenario
Estimated time to analyze detected intrusion attempts and implement
corrective actions: bestcase scenario minutes; worstcase scenario.
minutes
b Which of the following security investments would you recommend? Why? If you could do only one, which would you recommend? Why?
Invest $ to increase the estimated time to successfully penetrate the system by minutes
Invest $ to reduce the time to detect an intrusion attempt and notify appropriate security staff to minute in bestcase scenario, minutes in worstcase scenario
Invest $ to reduce the time required to analyze detected intrusion attempts and implement corrective actions to minutes under the bestcase scenario and minutes under the worstcase scenario
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
