CH 4 Assignment
CH 4 Assignment
CH 4 Assignment
333 MIS
Management Information Systems
Information Security
Student Name:
Sheet1
Section:
2. Suppose XYZ Software Company has a new application development project, with
projected revenues of $1,200,000. Using the following table, calculate ARO and ALE for
each threat category that XYZ Software Company faces for this project.
$75,000
1 per year
$500
1 per week
Theft of information
(employee)
Web defacement
$5,000
Theft of equipment
$5,000
1 per year
$1,500
1 per week
Denial-of-service attacks
Earthquake
Flood
Fire
$500
$250,00
0
$250,00
0
$500,00
0
SLE
ARO
ALE
1 per 6
months
1 per month
1 per 20
years
1 per 10
years
1 per 10
years
3. How might XYZ Software Company arrive at the values in the above table? For each
entry, describe the process of determining the cost per incident and frequency of
occurrence.
4. Assume a year has passed and XYZ has improved security by applying a number of
controls. Using the information from Exercise 2 and the following table, calculate the
post-control ARO and ALE for each threat category listed.
XYZ Software Company,
Cost
Frequency
Cost of
ALE
major threat categories for
per
of
Control
new applications
Incident Occurrence
development
Programmer mistakes
$5,000 1 per month $20,000
Training
Loss of intellectual property
Software piracy
Firewall/IDS
$2,500
Theft of information
(employee)
Web defacement
$5,000
Theft of equipment
Physical security
$1,500
Antivirus
Denial-of-service attacks
Earthquake
Flood
Fire
1 per 6
months
1 per year
Firewall/IDS
$15,000
Firewall/IDS
$15,000
Physical security
1 per6
$15,000
months
$2,500 1 per quarter $10,000
$250,00
0
$50,000
$100,00
0
1 per 20
years
1 per 10
years
1 per 10
years
$5,000
$10,000
$10,000
Firewall
Firewall
Insurance/Backu
ps
Insurance/Backu
ps
Insurance/Backu
ps
Why have some of the values changed in the columns Cost per Incident and Frequency of
Occurrence? How could a control affect one but not the other?
Assume the values in the Cost of Control column presented in the table are those unique
costs directly associated with protecting against that threat. Calculate CBA for the planned
risk control approach for each treat category. For each treat category, determine if
proposed control is worth the costs.