Book description
Light on mathematics and heavy on utility, this is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system. In addition to its obvious utility in the information security realm, the PRAGMATIC approach, introduced for the first time in this book, has broader application across diverse fields of management
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Foreword
- Preface
- Acknowledgments
- Office Memorandum
- Chapter 1 - Introduction (1/3)
- Chapter 1 - Introduction (2/3)
- Chapter 1 - Introduction (3/3)
- Chapter 2 - Why Measure Information Security? (1/4)
- Chapter 2 - Why Measure Information Security? (2/4)
- Chapter 2 - Why Measure Information Security? (3/4)
- Chapter 2 - Why Measure Information Security? (4/4)
- Chapter 3 - The Art and Science of Security Metrics (1/5)
- Chapter 3 - The Art and Science of Security Metrics (2/5)
- Chapter 3 - The Art and Science of Security Metrics (3/5)
- Chapter 3 - The Art and Science of Security Metrics (4/5)
- Chapter 3 - The Art and Science of Security Metrics (5/5)
- Chapter 4 - Audiences for Security Metrics (1/2)
- Chapter 4 - Audiences for Security Metrics (2/2)
- Chapter 5 - Finding Candidate Metrics (1/4)
- Chapter 5 - Finding Candidate Metrics (2/4)
- Chapter 5 - Finding Candidate Metrics (3/4)
- Chapter 5 - Finding Candidate Metrics (4/4)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (1/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (2/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (3/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (4/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (5/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (6/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (7/8)
- Chapter 6 - Metametrics and the PRAGMATIC Approach (8/8)
- Chapter 7 - 150+ Example Security Metrics (1/26)
- Chapter 7 - 150+ Example Security Metrics (2/26)
- Chapter 7 - 150+ Example Security Metrics (3/26)
- Chapter 7 - 150+ Example Security Metrics (4/26)
- Chapter 7 - 150+ Example Security Metrics (5/26)
- Chapter 7 - 150+ Example Security Metrics (6/26)
- Chapter 7 - 150+ Example Security Metrics (7/26)
- Chapter 7 - 150+ Example Security Metrics (8/26)
- Chapter 7 - 150+ Example Security Metrics (9/26)
- Chapter 7 - 150+ Example Security Metrics (10/26)
- Chapter 7 - 150+ Example Security Metrics (11/26)
- Chapter 7 - 150+ Example Security Metrics (12/26)
- Chapter 7 - 150+ Example Security Metrics (13/26)
- Chapter 7 - 150+ Example Security Metrics (14/26)
- Chapter 7 - 150+ Example Security Metrics (15/26)
- Chapter 7 - 150+ Example Security Metrics (16/26)
- Chapter 7 - 150+ Example Security Metrics (17/26)
- Chapter 7 - 150+ Example Security Metrics (18/26)
- Chapter 7 - 150+ Example Security Metrics (19/26)
- Chapter 7 - 150+ Example Security Metrics (20/26)
- Chapter 7 - 150+ Example Security Metrics (21/26)
- Chapter 7 - 150+ Example Security Metrics (22/26)
- Chapter 7 - 150+ Example Security Metrics (23/26)
- Chapter 7 - 150+ Example Security Metrics (24/26)
- Chapter 7 - 150+ Example Security Metrics (25/26)
- Chapter 7 - 150+ Example Security Metrics (26/26)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (1/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (2/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (3/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (4/5)
- Chapter 8 - Designing PRAGMATIC Security Measurement System (5/5)
- Chapter 9 - Advanced Information Security Metrics (1/3)
- Chapter 9 - Advanced Information Security Metrics (2/3)
- Chapter 9 - Advanced Information Security Metrics (3/3)
- Chapter 10 - Downsides of Metrics (1/2)
- Chapter 10 - Downsides of Metrics (2/2)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (1/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (2/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (3/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (4/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (5/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (6/7)
- Chapter 11 - Using PRAGMATIC Metrics in Practice (7/7)
- Chapter 12 - Case Study (1/9)
- Chapter 12 - Case Study (2/9)
- Chapter 12 - Case Study (3/9)
- Chapter 12 - Case Study (4/9)
- Chapter 12 - Case Study (5/9)
- Chapter 12 - Case Study (6/9)
- Chapter 12 - Case Study (7/9)
- Chapter 12 - Case Study (8/9)
- Chapter 12 - Case Study (9/9)
- Chapter 13 - Conclusions (1/3)
- Chapter 13 - Conclusions (2/3)
- Chapter 13 - Conclusions (3/3)
- Appendix A: PRAGMATIC Criteria
- Appendix B: Business Model of Information Security (BMIS)
- Appendix C: Capability Maturity Model (CMM)
- Appendix D: Example Opinion Survey Form
- Appendix E: SABSA Security Attributes Table (1/4)
- Appendix E: SABSA Security Attributes Table (2/4)
- Appendix E: SABSA Security Attributes Table (3/4)
- Appendix E: SABSA Security Attributes Table (4/4)
- Appendix F: Prototype Metrics Catalog (1/4)
- Appendix F: Prototype Metrics Catalog (2/4)
- Appendix F: Prototype Metrics Catalog (3/4)
- Appendix F: Prototype Metrics Catalog (4/4)
- Appendix G: Effect of Weighting the PRAGMATIC Criteria
- Appendix H: ISO27k Maturity Scale Metrics (1/9)
- Appendix H: ISO27k Maturity Scale Metrics (2/9)
- Appendix H: ISO27k Maturity Scale Metrics (3/9)
- Appendix H: ISO27k Maturity Scale Metrics (4/9)
- Appendix H: ISO27k Maturity Scale Metrics (5/9)
- Appendix H: ISO27k Maturity Scale Metrics (6/9)
- Appendix H: ISO27k Maturity Scale Metrics (7/9)
- Appendix H: ISO27k Maturity Scale Metrics (8/9)
- Appendix H: ISO27k Maturity Scale Metrics (9/9)
- Appendix I: Sample Management Survey
- Appendix J: Observer Bias
- Appendix K: Observer Calibration
- Appendix L: Bibliography
- Back Cover
Product information
- Title: PRAGMATIC Security Metrics
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781439881538
You might also like
book
Information Security Management Metrics
Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that …
book
Information Security Analytics
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you …
book
Security Metrics: Replacing Fear, Uncertainty, and Doubt
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the …
book
Information Security Governance Simplified
Security practitioners must be able to build a cost-effective security program while at the same time …