1. Analyze and evaluate the four desirable qualities of a valuable information security metric.
2. Analyze and evaluate four key elements of an effective business continuity plan.
3. List and evaluate four quantifiable security metrics associated with e-mail services.