Information Security Management Metrics

Book description

Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management. With case studies and tools for monitoring specific items, this book offers practical guidance for implementing metrics across an entire organization, thereby improving budget and resource allocation, and reducing the possibility that unanticipated events will have catastrophic impacts. The book presents metrics that complement those used by IT managers, and demonstrates how to make adjustments to metrics without interrupting business processes.

Table of contents

  1. Front cover
  2. Contents (1/2)
  3. Contents (2/2)
  4. Acknowledgments
  5. Introduction (1/2)
  6. Introduction (2/2)
  7. Chapter 1. Security Metrics Overview (1/3)
  8. Chapter 1. Security Metrics Overview (2/3)
  9. Chapter 1. Security Metrics Overview (3/3)
  10. Chapter 2. Security Metrics (1/2)
  11. Chapter 2. Security Metrics (2/2)
  12. Chapter 3. Current State of Security Metrics (1/7)
  13. Chapter 3. Current State of Security Metrics (2/7)
  14. Chapter 3. Current State of Security Metrics (3/7)
  15. Chapter 3. Current State of Security Metrics (4/7)
  16. Chapter 3. Current State of Security Metrics (5/7)
  17. Chapter 3. Current State of Security Metrics (6/7)
  18. Chapter 3. Current State of Security Metrics (7/7)
  19. Chapter 4. Metrics Developments (1/2)
  20. Chapter 4. Metrics Developments (2/2)
  21. Chapter 5. Relevance
  22. Chapter 6. The Metrics Imperative (1/2)
  23. Chapter 6. The Metrics Imperative (2/2)
  24. Chapter 7. Attributes of Good Metrics (1/2)
  25. Chapter 7. Attributes of Good Metrics (2/2)
  26. Chapter 8. Information Security Governance (1/2)
  27. Chapter 8. Information Security Governance (2/2)
  28. Chapter 9. Metrics Development-A Different Approach (1/2)
  29. Chapter 9. Metrics Development-A Different Approach (2/2)
  30. Chapter 10. Information Security Governance Metrics (1/2)
  31. Chapter 10. Information Security Governance Metrics (2/2)
  32. Chapter 11. Information Security Risk Management (1/2)
  33. Chapter 11. Information Security Risk Management (2/2)
  34. Chapter 12. Information Security Program Development Metrics
  35. Chapter 13. Information Security Management Metrics (1/6)
  36. Chapter 13. Information Security Management Metrics (2/6)
  37. Chapter 13. Information Security Management Metrics (3/6)
  38. Chapter 13. Information Security Management Metrics (4/6)
  39. Chapter 13. Information Security Management Metrics (5/6)
  40. Chapter 13. Information Security Management Metrics (6/6)
  41. Chapter 14. Incident Management and Response (1/2)
  42. Chapter 14. Incident Management and Response (2/2)
  43. Chapter 15. Conclusions
  44. Acronyms (1/2)
  45. Acronyms (2/2)
  46. Appendix A: Metrics Classifications1 (1/2)
  47. Appendix A: Metrics Classifications1 (2/2)
  48. Appendix B: Cultural Worldviews1
  49. Appendix C: The Competing Values Framework
  50. Appendix D: The Organization Culture Assessment Instrument (OCAI)
  51. Appendix E: SABSA Business Attribute Metrics (1/4)
  52. Appendix E: SABSA Business Attribute Metrics (2/4)
  53. Appendix E: SABSA Business Attribute Metrics (3/4)
  54. Appendix E: SABSA Business Attribute Metrics (4/4)
  55. Appendix F: Capability Maturity Model
  56. Appendix G: Probabilistic Risk Assessment (1/2)
  57. Appendix G: Probabilistic Risk Assessment (2/2)
  58. Index (1/3)
  59. Index (2/3)
  60. Index (3/3)
  61. Back cover

Product information

  • Title: Information Security Management Metrics
  • Author(s): Krag Brotby CISM
  • Release date: March 2009
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420052862