CYB 220 Technology Evaluation Criteria Worksheet
Zemas Howard
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation Evaluation Criteria Manager’s Questions Relevant Organizational Security Plan Information (From Scenario)
Factor — Aligned to
Criteria
Effectiveness Ability to identify 1.a. What are the organizational attributes?
network-connected 2.a.i. 4 restricted network segments for each department requiring remote
systems access
150-200 employees
What is the level of concern about who’s on (or off) the network?
It is substantially greater since it must detect everyone who has
malicious intentions.
Ability to discern 1.b. What are the organizational constraints?
operating systems 2.a.ii. To ensure continuity, each host must be running the same operating
of network- system.
connected systems What is the level of concern about detailed information relating to
specific assets on (or off) the network?
It is substantially greater now that assets are being tracked using Ips
to monitor for employee violations.
Ability to discern 1.a. What are the organizational attributes?
specific software 1.b. It would necessitate the software assigning to each
applications based 2.a.iii. segment/department.
on their unique data 2.a.v. What are the organizational constraints?
flows The same software would be used by all segments and departments.
What is the level of concern about the ability to defeat secure
communications?
Since the system would be vulnerable to other attacks as a result of
the protected communications breach, it is much greater.
What is the level of concern about potential for harm?
It is substantially greater since the data flow might be intercepted,
hacked or stopped.
CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard
,
CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard
Zemas Howard
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation Evaluation Criteria Manager’s Questions Relevant Organizational Security Plan Information (From Scenario)
Factor — Aligned to
Criteria
Effectiveness Ability to identify 1.a. What are the organizational attributes?
network-connected 2.a.i. 4 restricted network segments for each department requiring remote
systems access
150-200 employees
What is the level of concern about who’s on (or off) the network?
It is substantially greater since it must detect everyone who has
malicious intentions.
Ability to discern 1.b. What are the organizational constraints?
operating systems 2.a.ii. To ensure continuity, each host must be running the same operating
of network- system.
connected systems What is the level of concern about detailed information relating to
specific assets on (or off) the network?
It is substantially greater now that assets are being tracked using Ips
to monitor for employee violations.
Ability to discern 1.a. What are the organizational attributes?
specific software 1.b. It would necessitate the software assigning to each
applications based 2.a.iii. segment/department.
on their unique data 2.a.v. What are the organizational constraints?
flows The same software would be used by all segments and departments.
What is the level of concern about the ability to defeat secure
communications?
Since the system would be vulnerable to other attacks as a result of
the protected communications breach, it is much greater.
What is the level of concern about potential for harm?
It is substantially greater since the data flow might be intercepted,
hacked or stopped.
CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard
,
CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard