CYB 220 Technology Evaluation Criteria Worksheet For each section of this worksheet, fill in the empty cells with the required information. Technology Evaluation Criteria Table
CYB 220 Technology Evaluation Criteria Worksheet
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation Factor | Evaluation Criteria | Manager’s Questions—Aligned to Criteria | Relevant Organizational Security Plan Information (From Scenario) |
Effectiveness | Ability to identify network-connected systems | 1.a.
2.a.i. Save your time - order a paper!Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines Order Paper Now |
|
Ability to discern operating systems of network-connected systems | 1.b.
2.a.ii. |
||
Ability to discern specific software applications based on their unique data flows | 1.a.
1.b. 2.a.iii. 2.a.v. |
||
Ability to handle encrypted data flows | 1.b.
2.a.iii. 2.a.v. |
||
Reliability under stress | 1.b.
2.a.iv. |
||
Potential to cause individual network-connected system outage | 1.b.
2.a.iv. 2.a.v. |
||
Potential to cause individual network-connected system disruption/slowdown | 1.a.
2.a.i. 2.a.v. |
||
Potential cause of network outage | 1.a.
2.a.i. 2.a.iii. 2.a.iv. |
||
Potential cause of network disruption/slowdown | 1.a.
2.a.i. 2.a.iii. 2.a.iv. |
||
Potential cause of excessive alerts | 1.b.
2.a.i. 2.a.iii. |
||
Cost | Software | 1.a.
1.b. 2.b.i. 2.b.ii. |
|
Personnel (training) | 1.a.
1.b. 2.b.i. 2.b.ii. |
||
Deployment (time to implement) | 1.a.
1.b. 2.b.ii. 2.b.iii. 2.b.iv. |
||
Deployment (complexity) | 1.b.
2.b.ii. 2.b.iv. |
Evaluation Criteria Priority List
1. | |
2. | |
3. | |
Justification |
Fundamental Security Design Principles
1. | |
2. | |
Explanation of Correlation |