Cargando…

Information security management metrics : a definitive guide to effective security monitoring and measurement /

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Brotby, W. Krag (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach Publications, ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn418784693
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 090529s2009 flua ob 001 0 eng d
040 |a YUS  |b eng  |e pn  |c YUS  |d CUS  |d VLB  |d SHH  |d OCLCQ  |d B24X7  |d CC#  |d TULIB  |d OCLCQ  |d OCLCO  |d YDXCP  |d DOS  |d OCLCF  |d OCLCO  |d N$T  |d EBLCP  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d MERUC  |d OCLCA  |d NLE  |d COO  |d OCLCQ  |d UKMGB  |d BRF  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ  |d OCLCO 
015 |a GBB7B0524  |2 bnb 
016 7 |a 018393422  |2 Uk 
019 |a 779922802  |a 899155979 
020 |a 9781420052862  |q (electronic bk.) 
020 |a 1420052861  |q (electronic bk.) 
020 |z 1420052853 
020 |z 9781420052855 
029 1 |a AU@  |b 000053319015 
029 1 |a AU@  |b 000060416899 
029 1 |a AU@  |b 000066972077 
029 1 |a DEBSZ  |b 431527865 
029 1 |a DEBSZ  |b 449389812 
029 1 |a UKMGB  |b 018393422 
035 |a (OCoLC)418784693  |z (OCoLC)779922802  |z (OCoLC)899155979 
037 |a TANDF_183329  |b Ingram Content Group 
050 4 |a HD30.2  |b .B78 2009eb 
072 7 |a BUS  |x 082000  |2 bisacsh 
072 7 |a BUS  |x 041000  |2 bisacsh 
072 7 |a BUS  |x 042000  |2 bisacsh 
072 7 |a BUS  |x 085000  |2 bisacsh 
082 0 4 |a 658.4/78  |2 22 
049 |a UAMI 
100 1 |a Brotby, W. Krag,  |e author. 
245 1 0 |a Information security management metrics :  |b a definitive guide to effective security monitoring and measurement /  |c W. Krag Brotby. 
260 |a Boca Raton :  |b Auerbach Publications,  |c ©2009. 
300 |a 1 online resource (xix, 223 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Security metrics overview -- Metrics and objectives -- Information security -- IT security -- Other assurance functions -- Stakeholders -- Security metrics -- Security program effectiveness -- Types of metrics -- Information assurance / security metrics classification -- Monitoring vs. metrics -- Current state of security metrics -- Quantitative measures and metrics -- Financial metrics -- Return on investments -- Payback method -- ROI calculation -- NPV -- IRR -- Return on security investment (ROSI) -- SLE and ALE -- ROSI -- A new ROSI model -- A more complex security ROI -- Security attribute evaluation method (SAEM) -- Cost-effectiveness analysis -- Cost-benefit analysis -- Fault tree analysis -- Value at ris (VAR) -- ALE/SLE -- Qualitative security metrics -- Cultural metrics -- Risk management through cultural theory -- The competing values framework -- Organizational structure -- Hybrid approaches -- Systemic security management -- Balanced scorecard -- The SABSA business attributes approach -- Quality metrics -- Six sigma -- ISO 9000 -- Maturity level -- Benchmarking -- Standards -- OCTAVE -- Metrics developments -- Statistical modeling -- Systemic security management -- Value at risk analysis -- Factor analysis of information risk (FAIR) -- Risk factor analysis -- Probabilistic risk assessment (PRA) -- Relevance -- Problem Inertia -- Correlating metrics to consequences -- The metrics imperative -- Study of ROSI of security measures -- Resource allocation -- Managing without metrics -- Attributes of good metrics -- Metrics objectives -- Measurement categories -- Effective metrics -- What is being measured? -- Why is it measured? -- Who are the recipients? -- What does it mean? -- What action is required? -- Information security governance -- Security governance outcomes -- Defining security objectives -- Sherwood applied business security architecture (SABSA) -- CobiT -- ISO 27001 -- Capability maturity model -- Current state -- Information security strategy -- Metrics development -- a different approach -- The information security manager -- Activities requiring metrics -- Criticality and sensitivity -- Degree of risk or potential impact -- Risk over time -- Options and cost-effectiveness -- Ranking metrics and monitoring requirements -- Monitoring, measures, or metrics? -- Information security governance metrics -- Strategic security governance decisions -- Strategic security governance decision metrics -- Security governance management decisions -- Strategic direction -- Ensuring objectives are achieved -- Managing risks appropriately -- Using resources responsibly -- Security governance operational decisions -- Information security risk management -- Information security risk management decisions -- Management requirements for information security risk -- Criticality of assets -- Sensitivity of assets -- The nature and magnitude of impacts -- Vulnerabilities -- Threats -- Probability of compromise -- Strategic initiatives and plans -- Acceptable levels of risk and impact -- Information security operational risk metrics -- Information security program development metrics -- Program development management metrics -- Program development operational metrics -- Information security management metrics -- Security management decision support metrics -- Security management decisions -- Strategic alignment -- Risk management -- Metrics for risk management -- Assurance process integration -- Value delivery -- Resource management -- Performance measurement -- Information security management operational decision -- Support metrics -- IT and information security management -- Compliance metrics -- Incident management and response -- Incident management decision support metrics -- Is it actually an incident? -- What kind of incident is it? -- Is it a security incident? -- What is the severity level? -- Are there multiple events and / or impacts? -- Will an incident need triage? -- What is the most effective response? -- What immediate actions must be taken? -- Which incident response teams and other personnel must be mobilized? -- Who must be notified? -- Who is in charge -- Is it becoming a disaster? -- Conclusions -- Predictive metrics. 
520 |a Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions: a- How secure is my organization?; b- How much security is enough?; c- What are the most cost-effective security solutions?; and d- How secure is my organization? This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization's business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response. -- Back cover. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Brotby, W. Krag.  |t Information security management metrics.  |d Boca Raton : CRC Press, ©2009  |z 9781420052855  |w (DLC) 2009000669  |w (OCoLC)148650233 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781420052862/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00026440 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1447239 
938 |a EBSCOhost  |b EBSC  |n 934616 
938 |a YBP Library Services  |b YANK  |n 3052617 
994 |a 92  |b IZTAP