Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
119
Chapter 9
Metrics for Monitoring
*
Sandy Bacik
A security policy architecture document should not be written unless it applies to protecting an
enterprise asset and unless executive management is willing to enforce it. Another thing to remem-
ber is as a security policy architecture document is written, how is it going to be monitored and
enforced? erefore, what specific items or activities can be monitored that are documented within
the security policy architecture document. e details from the security policy architecture docu-
ments are what the enterprise can use to develop and document security metrics or the return on
security investments ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498