vulnerability metrics

Anonymous

Question Description

I am looking for someone who can give me a complete document on vulnerability metrics about 15 pages including intro

Tutor Answer

Robyn1994
School: Carnegie Mellon University

Attached.

Running Head: VULNERABILITY METRICS
Vulnerability Metrics
Student Name:
Professor Name:
Course Name &Number:
Date:

1

VULNERABILITY METRICS
Table of Contents
Executive Summary ………………………………………………………….……………..3
Introduction …………………………………………………………………….…….……..4
The ideology of Vulnerability Metrics……………………………………………….…..….4
Categories of Metrics……………………………………………………………….…….…5
Categories of vulnerability metrics………………………………………………….………5
Technical vulnerability measurements……………………………………………….……...6
Process vulnerability measurement………………………………………………….………6
People vulnerability measurements…………………………………………………….……6
Core vulnerability metrics…………………………………………………………….……6
Access Control………………………………………………………………………………7
Incident Volume Response…………………………………………………………………7
Physical Access……………………………………………………………………….…….8
Baseline Defense Coverage………………………………………………………..….……9
Patch Latency………………………………………………………………….…….……..10
Other critical Vulnerability Metrics……………………………………………….………10
Time to Detect…………………………………………………………………..………….10
Time to Mitigation…………………………………………………………………………11
Patch management Efficiency……………………………………………………………..12
System Hardening Metric………………………………………………………….………12
Conclusion………………………………………………………………………………….13
References…………………………………………………………………………………..14

2

VULNERABILITY METRICS

3

Executive summary
Vulnerabilities metrics form an integral part of business operations and networks. These security
measures are an important part of qualitative and quantitative measurement of any given security
program. However, vulnerability metrics differ from one organization to another based on the
company’s business as well as operations. Despite the variation in company security metrics
based on factors such as company business and operations, there are several vulnerability metrics
that are popular among industries and as a result should be taken into consideration when
choosing effective vulnerability measures. However, when choosing the vulnerability metrics for
an organization, there are three vital categories that should be covered and these include:
Technical Vulnerability Measurements, Process Vulnerability Measurements, as well as
People Vulnerability Measurement (Tenabble et al., 2013). Based on these considerations,
there are five core vulnerability metrics that include: Access Control, Physical Access,
Incident Volume Response, Patch Latency, as well as Baseline Defense Coverage. The choice
of vulnerability metrics to use will solely depend on the nature of the given organization and
its operations and systems as well.

VULNERABILITY METRICS

4

Introduction
The security system of any given enterprise is almost impossible to measure. Presentation
of the security posture of an institution in a clear and conscious manner is a very challenging task
for the Chief Information Security Officer due to the threats and dangers these cyber threats pose
to sensitive information and computing substructure accessibility. In areas related to IT, it is very
challenging to manage unless an enterprise is able to measure. Both quantitative and qualitative
measures require vulnerability metrics of some sort to help in the management as well as
employees in identifying risk exposure, effectiveness of their mitigation efforts, and the overall
progress of the organization (Wang 2009). Consequently, it is integral to understand the various
vulnerability measures tha...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors