Book description
Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management. With case studies and tools for monitoring specific items, this book offers practical guidance for implementing metrics across an entire organization, thereby improving budget and resource allocation, and reducing the possibility that unanticipated events will have catastrophic impacts. The book presents metrics that complement those used by IT managers, and demonstrates how to make adjustments to metrics without interrupting business processes.
Table of contents
- Front cover
- Contents (1/2)
- Contents (2/2)
- Acknowledgments
- Introduction (1/2)
- Introduction (2/2)
- Chapter 1. Security Metrics Overview (1/3)
- Chapter 1. Security Metrics Overview (2/3)
- Chapter 1. Security Metrics Overview (3/3)
- Chapter 2. Security Metrics (1/2)
- Chapter 2. Security Metrics (2/2)
- Chapter 3. Current State of Security Metrics (1/7)
- Chapter 3. Current State of Security Metrics (2/7)
- Chapter 3. Current State of Security Metrics (3/7)
- Chapter 3. Current State of Security Metrics (4/7)
- Chapter 3. Current State of Security Metrics (5/7)
- Chapter 3. Current State of Security Metrics (6/7)
- Chapter 3. Current State of Security Metrics (7/7)
- Chapter 4. Metrics Developments (1/2)
- Chapter 4. Metrics Developments (2/2)
- Chapter 5. Relevance
- Chapter 6. The Metrics Imperative (1/2)
- Chapter 6. The Metrics Imperative (2/2)
- Chapter 7. Attributes of Good Metrics (1/2)
- Chapter 7. Attributes of Good Metrics (2/2)
- Chapter 8. Information Security Governance (1/2)
- Chapter 8. Information Security Governance (2/2)
- Chapter 9. Metrics Development-A Different Approach (1/2)
- Chapter 9. Metrics Development-A Different Approach (2/2)
- Chapter 10. Information Security Governance Metrics (1/2)
- Chapter 10. Information Security Governance Metrics (2/2)
- Chapter 11. Information Security Risk Management (1/2)
- Chapter 11. Information Security Risk Management (2/2)
- Chapter 12. Information Security Program Development Metrics
- Chapter 13. Information Security Management Metrics (1/6)
- Chapter 13. Information Security Management Metrics (2/6)
- Chapter 13. Information Security Management Metrics (3/6)
- Chapter 13. Information Security Management Metrics (4/6)
- Chapter 13. Information Security Management Metrics (5/6)
- Chapter 13. Information Security Management Metrics (6/6)
- Chapter 14. Incident Management and Response (1/2)
- Chapter 14. Incident Management and Response (2/2)
- Chapter 15. Conclusions
- Acronyms (1/2)
- Acronyms (2/2)
- Appendix A: Metrics Classifications1 (1/2)
- Appendix A: Metrics Classifications1 (2/2)
- Appendix B: Cultural Worldviews1
- Appendix C: The Competing Values Framework
- Appendix D: The Organization Culture Assessment Instrument (OCAI)
- Appendix E: SABSA Business Attribute Metrics (1/4)
- Appendix E: SABSA Business Attribute Metrics (2/4)
- Appendix E: SABSA Business Attribute Metrics (3/4)
- Appendix E: SABSA Business Attribute Metrics (4/4)
- Appendix F: Capability Maturity Model
- Appendix G: Probabilistic Risk Assessment (1/2)
- Appendix G: Probabilistic Risk Assessment (2/2)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: Information Security Management Metrics
- Author(s):
- Release date: March 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781420052862
You might also like
book
Metrics and Methods for Security Risk Management
Security problems have evolved in the corporate world because of technological changes, such as using the …
book
PRAGMATIC Security Metrics
Light on mathematics and heavy on utility, this is the ultimate how-to-do-it guide for security metrics. …
book
Information Security Policy Development for Compliance
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards …
book
Security Metrics: Replacing Fear, Uncertainty, and Doubt
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the …