100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard

Rating
-
Sold
-
Pages
7
Uploaded on
04-08-2025
Written in
2025/2026

CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 4, 2025
Number of pages
7
Written in
2025/2026
Type
Other
Person
Unknown

Subjects

  • effectiveness

Content preview

CYB 220 Technology Evaluation Criteria Worksheet
Zemas Howard

For each section of this worksheet, fill in the empty cells with the required information.

Technology Evaluation Criteria Table
Evaluation Evaluation Criteria Manager’s Questions Relevant Organizational Security Plan Information (From Scenario)
Factor — Aligned to
Criteria
Effectiveness Ability to identify 1.a. What are the organizational attributes?
network-connected 2.a.i. 4 restricted network segments for each department requiring remote
systems access
150-200 employees
What is the level of concern about who’s on (or off) the network?
It is substantially greater since it must detect everyone who has
malicious intentions.
Ability to discern 1.b. What are the organizational constraints?
operating systems 2.a.ii. To ensure continuity, each host must be running the same operating
of network- system.
connected systems What is the level of concern about detailed information relating to
specific assets on (or off) the network?

It is substantially greater now that assets are being tracked using Ips
to monitor for employee violations.
Ability to discern 1.a. What are the organizational attributes?
specific software 1.b. It would necessitate the software assigning to each
applications based 2.a.iii. segment/department.
on their unique data 2.a.v. What are the organizational constraints?
flows The same software would be used by all segments and departments.
What is the level of concern about the ability to defeat secure
communications?
Since the system would be vulnerable to other attacks as a result of
the protected communications breach, it is much greater.
What is the level of concern about potential for harm?
It is substantially greater since the data flow might be intercepted,
hacked or stopped.

CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard

,
CYB 220 5-2 Project Three Milestone Prioritizing Evaluation Criteria Zemas Howard

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Boffin Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1762
Member since
4 year
Number of followers
1469
Documents
7146
Last sold
14 hours ago
Pilot Study

Prevent resits and get higher grades.

3.8

433 reviews

5
209
4
74
3
70
2
16
1
64

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions