Question

In: Computer Science

Is there any benchmark for surveying the performance of security architecture? Test or evaluate the performance.

Is there any benchmark for surveying the performance of security architecture?

Test or evaluate the performance.

Solutions

Expert Solution

A benchmark is a point of reference by which something can be measured. In surveying, a "bench mark" (two words) is a post or other permanent mark established at a known elevation that is used as the basis for measuring the elevation of other topographical points. The computer world and Internet technology, the term may have these meanings:

A product/system is measured in a set of conditions against which computer frequently test and compare several new computers or computer devices against the same set of application programs, user interactions, and contextual situations. The total context against which all products/computersare measured and compared is referred to as the benchmark.How an organization’s security architecture compares with those of its peers, how it compares to industry standards and best practices, and where different gaps and shortcomings exist that lower the overall security maturity of the organization.Let’s take a look at a few of the different ways in which benchmarking can help organizations make more informed decisions around their security programs .

Performance Evalutation BASS: A benchmark suite for evaluating architectural security systems.The BASS suite has been designed to facilitate the security evaluation of proposed architectural security solutions while ensuring the thoroughness of evaluation by addressing attack dimension diversity. All attacks are not created equal and even within a broad attack classification such as buffer overflow or format string attack there can be great diversity.

Performance Evalutation ISF Benchmark is a strategic tool available to ISF Member organisations.provides an easy to digest illustrative overview of how organisations can effectively use the ISF Benchmark to assess and improve their security arrangements.ISF Benchmark results are available in real time as soon as you submit the data you can view results and begin your analysis and peer comparisons.ISF Benchmark provides that objective analysis allowing you to measure both the effectiveness and value of your security investments.


Related Solutions

Security Software Architecture Performance Software Architecture Information Architecture Records Management
 Security Software Architecture Performance Software Architecture Information Architecture Records Management
explain Information security objectives as drivers for security architecture development.
explain Information security objectives as drivers for security architecture development.
List and explain the three-tiers security in network architecture?
List and explain the three-tiers security in network architecture?
plan, promotes coordination and communication, and provides a benchmark for evaluating actual performance.
  plan, promotes coordination and communication, and provides a benchmark for evaluating actual performance. Describe a situation where a topic (a concept, one learning outcome) from the chapter is applied outside the classroom. In your career? Your personal life? A current event? Another class? Did you describe this topic (concept, learning outcome) in a few sentences with enough detail to indicate that you understand the concept? You do not need to summarize the entire chapter. Does the topic you described...
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Enterprise Architecture Discuss the impact of Enterprise Architecture changes in any business process model. Especially on...
Enterprise Architecture Discuss the impact of Enterprise Architecture changes in any business process model. Especially on the aspect of outsourcing. [20 marks] 1.5 pages or 200 words.
How to evaluate the performance university????
How to evaluate the performance university????
How to evaluate the performance university????
How to evaluate the performance university????
How to Evaluate the performance of university
How to Evaluate the performance of university
A number of security devices can be placed at appropriate places in the network architecture to...
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT