Cargando…

How to measure anything in cybersecurity risk /

A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. I...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hubbard, Douglas W., 1962- (Autor), Seiersen, Richard, 1967- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley, [2016]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn953458699
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 160712s2016 nju ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d EBLCP  |d TEFOD  |d N$T  |d DG1  |d YDX  |d RECBK  |d DG1  |d IDEBK  |d IDB  |d UPM  |d DG1  |d OTZ  |d OCLCQ  |d CCO  |d K6U  |d LOA  |d COCUF  |d MERUC  |d ZCU  |d ICG  |d CNNOR  |d OCLCQ  |d D6H  |d OCLCQ  |d OCLCO  |d WRM  |d STF  |d OCLCF  |d KSU  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d LVT  |d S8J  |d S9I  |d TKN  |d U3W  |d OCLCQ  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCL  |d NZAUC  |d UKMGB  |d OCLCQ  |d GZM  |d TEF  |d OCLCO  |d OCLCL 
015 |a GBB6A7551  |2 bnb 
016 7 |a 017949329  |2 Uk 
019 |a 957617228  |a 957736940  |a 959330081  |a 959590759  |a 1376385519 
020 |a 9781119224600  |q (electronic bk.) 
020 |a 1119224608  |q (electronic bk.) 
020 |a 9781119224617  |q (electronic bk.) 
020 |a 1119224616  |q (electronic bk.) 
020 |a 9781119162315  |q (electronic bk.) 
020 |a 1119162319  |q (electronic bk.) 
020 |z 9781119085294 
020 |z 1119085292 
024 7 |a 10.1002/9781119162315  |2 doi 
029 1 |a AU@  |b 000061349448 
029 1 |a CHBIS  |b 010879142 
029 1 |a CHNEW  |b 000945501 
029 1 |a CHVBK  |b 480256608 
029 1 |a DEBBG  |b BV043894833 
029 1 |a UKMGB  |b 017949329 
035 |a (OCoLC)953458699  |z (OCoLC)957617228  |z (OCoLC)957736940  |z (OCoLC)959330081  |z (OCoLC)959590759  |z (OCoLC)1376385519 
037 |a B5CB30D5-FEBC-477E-9C2E-0C5EBA890E05  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV6773.15.C97  |b H835 2016 
072 7 |a BUS  |x 061000  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 23 
084 |a BUS061000  |a COM053000  |2 bisacsh 
049 |a UAMI 
100 1 |a Hubbard, Douglas W.,  |d 1962-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjBkFm84JGy6X73hCJ4J8P 
245 1 0 |a How to measure anything in cybersecurity risk /  |c Douglas W. Hubbard, Richard Seiersen. 
264 1 |a Hoboken, New Jersey :  |b Wiley,  |c [2016] 
300 |a 1 online resource (304 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
500 |a Includes index. 
520 |a A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing & mdash;as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques"--  |c Provided by publisher. 
520 |a "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"--  |c Provided by publisher 
505 0 |a How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of Measurement. 
505 8 |a A Definition of MeasurementA Taxonomy of Measurement Scales; Bayesian Measurement: A Pragmatic Concept for Decisions; The Object of Measurement; The Methods of Measurement; Statistical Significance: What's the Significance?; Small Samples Tell You More Than You Think; Notes; Chapter 3 Model Now! An Introduction to Practical Quantitative Methods for Cybersecurity; A Simple One-for-One Substitution; The Expert as the Instrument; Doing "Uncertainty Math"; An Introduction to Generating Random Events and Impacts in Excel; Adding Up the Risks; Visualizing Risk. 
505 8 |a Explaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human Component. 
505 8 |a The Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other Fallacies. 
505 8 |a Beliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition." 
504 |a Includes bibliographical references and index. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Cyberterrorism. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Risk management. 
650 2 |a Risk Management 
650 6 |a Cyberterrorisme. 
650 6 |a Gestion du risque. 
650 7 |a risk management.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Statistics.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a Risk management  |2 fast 
650 7 |a Cyberterrorism.  |2 nli 
650 7 |a Cyberspace  |x Security measures.  |2 nli 
650 7 |a Risk management.  |2 nli 
700 1 |a Seiersen, Richard,  |d 1967-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjDpy4qdHvy79ycRTxD7Dy 
758 |i has work:  |a How to measure anything in cybersecurity risk (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGJ6B7Hf38yqMJKrdqkPXq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hubbard, Douglas W., 1962-  |t How to measure anything in cybersecurity risk.  |d Hoboken : Wiley, 2016  |z 9781119085294  |w (DLC) 2016025853  |w (OCoLC)920454627 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4585272  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29844862 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29844861 
938 |a EBSCOhost  |b EBSC  |n 1281131 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00685822 
938 |a YBP Library Services  |b YANK  |n 13067110 
938 |a YBP Library Services  |b YANK  |n 13130207 
994 |a 92  |b IZTAP