Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
124 ◾  Information Security Management Handbook
collected and where they will be distributed on what specific schedule. is will allow the man-
agement to see the standard progress in asset protection. e regular metrics will give the security
the foundation for justifying additional security software and additional staff for the security
program. e regular metrics also can be used when presenting user awareness training. Metrics
can improve accountability through collection, analysis, and reporting of relevant performance-
related data. e procedures should be a step-by-step document on how and where the scripts or
applications are executed. e security metrics program can be set up on a repeatable cycle. See
Table 9.2 for a sample of the secu ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498