LEADER 03686oam 2200661I 450 001 9910462893303321 005 20200520144314.0 010 $a0-429-11156-8 010 $a1-4398-8153-7 024 7 $a10.1201/b14047 035 $a(CKB)2670000000341605 035 $a(EBL)1153198 035 $a(OCoLC)831118565 035 $a(SSID)ssj0000905647 035 $a(PQKBManifestationID)11491739 035 $a(PQKBTitleCode)TC0000905647 035 $a(PQKBWorkID)10926518 035 $a(PQKB)11092043 035 $a(MiAaPQ)EBC1153198 035 $a(CaSebORM)9781439881538 035 $a(Au-PeEL)EBL1153198 035 $a(CaPaEBR)ebr10674495 035 $a(CaONFJC)MIL502173 035 $a(EXLCZ)992670000000341605 100 $a20180331d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPRAGMATIC security metrics $eapplying metametrics to information security /$fW. Krag Brotby and Gary Hinson ; preface by M. E. Kabay 205 $a1st edition 210 1$aBoca Raton, Fla. :$cCRC Press,$d2013. 215 $a1 online resource (507 p.) 300 $aAn Auerbach book--T.p. 311 $a1-4398-8152-9 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Foreword; Preface; Acknowledgments; Office Memorandum; Chapter 1 - Introduction; Chapter 2 - Why Measure Information Security?; Chapter 3 - The Art and Science of Security Metrics; Chapter 4 - Audiences for Security Metrics; Chapter 5 - Finding Candidate Metrics; Chapter 6 - Metametrics and the PRAGMATIC Approach; Chapter 7 - 150+ Example Security Metrics; Chapter 8 - Designing PRAGMATIC Security Measurement System; Chapter 9 - Advanced Information Security Metrics; Chapter 10 - Downsides of Metrics; Chapter 11 - Using PRAGMATIC Metrics in Practice 327 $aChapter 12 - Case StudyChapter 13 - Conclusions; Appendix A: PRAGMATIC Criteria; Appendix B: Business Model of Information Security (BMIS); Appendix C: Capability Maturity Model (CMM); Appendix D: Example Opinion Survey Form; Appendix E: SABSA Security Attributes Table; Appendix F: Prototype Metrics Catalog; Appendix G: Effect of Weighting the PRAGMATIC Criteria; Appendix H: ISO27k Maturity Scale Metrics; Appendix I: Sample Management Survey; Appendix J: Observer Bias; Appendix K: Observer Calibration; Appendix L: Bibliography; Back Cover 330 $aOther books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to help: Security professionals syst 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aComputer security 606 $aData protection 608 $aElectronic books. 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aData protection. 676 $a658.478 700 $aBrotby$b W. Krag.$0862239 701 $aHinson$b Gary$01038411 701 $aKabay$b Michel E$01038412 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462893303321 996 $aPRAGMATIC security metrics$92459974 997 $aUNINA