Question

For this project, assume that an organization has five servers. Server 1 has a TCO of...

For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers 4 and 5—have a TCO of $42,000 each. The servers are not used by internal employees but are used by Web visitors. The total income that all five servers brings in is $5 million a year (equally provided by all five servers). Compute the total asset value for each of the five servers. In order to recover from an attack on any one server, it would take an estimated 14 hours to rebuild Servers 1, 2, 3, and 4 and 37 hours to rebuild Server 5. If each server is required to be online 8,760 hours a year, compute the EF for each server. Since the security for the five Web servers is moderate, a Web attack is estimated to occur once per year. Compute the ARO for a Web attack. What is the ALE for a Web attack for each of the five servers? What is the total ALE for the entire organization for a Web attack that damages all five servers at the same time? Based on the calculated ALE for an attack that damages all five servers, how much should the organization spend on security controls to prevent Web attacks on the five servers?

0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
For this project, assume that an organization has five servers. Server 1 has a TCO of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • An organization determines that the probability of unauthorized access to a database that contains personally identifiable...

    An organization determines that the probability of unauthorized access to a database that contains personally identifiable information (PII) about its clients and employees is 5% in a year. The total estimate of the loss due to this exposure is estimated to be 5 million dollars. This includes losses resulting from loss of reputation, business operations, fines imposed by FCC, legal fees. After consulting with a security firm, a product was identified that could implement stronger access control and that could...

  • Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access S...

    Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...

  • Your client, Virus-Victim, Inc. (VVI), has suffered an attack. The company sells popular retail items only...

    Your client, Virus-Victim, Inc. (VVI), has suffered an attack. The company sells popular retail items only via the Internet to customers all over the world. The perpetrator has been identified and local law enforcement and the county prosecutor are handling the criminal action. VVI believes that the perpetrator has the deep pockets to compensate VVI for its losses associated with the attack. The perpetrator committed the act at 12:01 am Saturday, July 4th and the retail website was down for...

  • PR 26-5A Alternative capital investments OBJ. 3, 4 1. Server upgrade, The investment committee of Sentry...

    PR 26-5A Alternative capital investments OBJ. 3, 4 1. Server upgrade, The investment committee of Sentry Insurance Co. is evilfferent usef $11,105 office ex- project pansion and upgrade to computer servers. The projects lives, ful each requires an investment of $490,000. The estimated net cash are as follows: flows from 1305 Chapter 26 Capital Investment Analysis Net Cash Flows Office Expansion Servers $125,000 $16000 25,000 165,000 165,000 125,000 125,000 125,000 The committee has selected a rte of 12% for purposes...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Shoney Video Concepts produces a line of video streaming servers that are linked to personal computers...

    Shoney Video Concepts produces a line of video streaming servers that are linked to personal computers for storing movies. These devices have very fast access and large storage capacity.     Shoney is trying to determine a production plan for the next 12 months. The main criterion for this plan is that the employment level is to be held constant over the period. Shoney is continuing in its R&D efforts to develop new applications and prefers not to cause any adverse feelings...

  • Problem 8-13 Shoney Video Concepts produces a line of video streaming servers that are linked to...

    Problem 8-13 Shoney Video Concepts produces a line of video streaming servers that are linked to personal computers for storing movies. These devices have very fast access and large storage capacity.     Shoney is trying to determine a production plan for the next 12 months. The main criterion for this plan is that the employment level is to be held constant over the period. Shoney is continuing in its R&D efforts to develop new applications and prefers not to cause any...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Part 1. A machine costing $22,000 with a five-year life and an estimated $2,000 salvage value...

    Part 1. A machine costing $22,000 with a five-year life and an estimated $2,000 salvage value is installed on January 1. The factory manager estimates the machine will produce 1,000 units of product during its life. It actually produces the following units: Year 1, 200; Year 2, 400; Year 3, 300; Year 4, 80; and Year 5, 30. The total number of units produced by the end of Year 5 exceeds the original estimate this difference was not predicted. (The...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT