CYB 220 Technology Evaluation Criteria Worksheet For each section of this worksheet, fill in the empty cells with the required information. Technology Evaluation Criteria Table.
CYB 220 Technology Evaluation Criteria Worksheet
For each section of this worksheet, fill in the empty cells with the required information.
Technology Evaluation Criteria Table
Evaluation Factor | Evaluation Criteria | Manager’s Questions—Aligned to Criteria | Relevant Organizational Security Plan Information (From Scenario) |
Effectiveness | Ability to identify network-connected systems | 1.a.
2.a.i. |
|
Ability to discern operating systems of network-connected systems | 1.b.
2.a.ii. |
||
Ability to discern specific software applications based on their unique data flows | 1.a.
1.b. 2.a.iii. 2.a.v. |
||
Ability to handle encrypted data flows | 1.b.
2.a.iii. 2.a.v. |
||
Reliability under stress | 1.b.
2.a.iv. |
||
Potential to cause individual network-connected system outage | 1.b.
2.a.iv. 2.a.v. |
||
Potential to cause individual network-connected system disruption/slowdown | 1.a.
2.a.i. 2.a.v. |
||
Potential cause of network outage | 1.a.
2.a.i. 2.a.iii. 2.a.iv. |
||
Potential cause of network disruption/slowdown | 1.a.
2.a.i. 2.a.iii. 2.a.iv. |
||
Potential cause of excessive alerts | 1.b.
2.a.i. 2.a.iii. |
||
Cost | Software | 1.a.
1.b. 2.b.i. 2.b.ii. |
|
Personnel (training) | 1.a.
1.b. 2.b.i. 2.b.ii. |
||
Deployment (time to implement) | 1.a.
1.b. 2.b.ii. 2.b.iii. 2.b.iv. |
||
Deployment (complexity) | 1.b.
2.b.ii. 2.b.iv. |
Evaluation Criteria Priority List
1. | |
2. | |
3. | |
Justification |
Fundamental Security Design Principles
1. | |
2. | |
Explanation of Correlation |