LEADER 03293oam 2200529 450 001 9910818950103321 005 20240214110151.0 010 $a0-429-11156-8 010 $a1-4398-8153-7 024 7 $a10.1201/b14047 035 $a(OCoLC)831118565 035 $a(MiFhGG)GVRL8QAX 035 $a(EXLCZ)992670000000341605 100 $a20130405h20132013 uy 0 101 0 $aeng 135 $aurun#---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aPragmatic security metrics $eapplying metametrics to information security /$fW. Krag Brotby and Gary Hinson ; preface by M.E. Kabay 205 $a1st edition 210 1$aBoca Raton :$cCRC Press, Taylor & Francis Group,$d[2013] 210 4$d?2013 215 $a1 online resource (xviii, 485 pages) $cillustrations 225 0 $aGale eBooks 300 $a"An Auerbach book." 311 $a1-4398-8152-9 320 $aIncludes bibliographical references. 327 $aFront Cover; Contents; Foreword; Preface; Acknowledgments; Office Memorandum; Chapter 1 - Introduction; Chapter 2 - Why Measure Information Security?; Chapter 3 - The Art and Science of Security Metrics; Chapter 4 - Audiences for Security Metrics; Chapter 5 - Finding Candidate Metrics; Chapter 6 - Metametrics and the PRAGMATIC Approach; Chapter 7 - 150+ Example Security Metrics; Chapter 8 - Designing PRAGMATIC Security Measurement System; Chapter 9 - Advanced Information Security Metrics; Chapter 10 - Downsides of Metrics; Chapter 11 - Using PRAGMATIC Metrics in Practice 327 $aChapter 12 - Case StudyChapter 13 - Conclusions; Appendix A: PRAGMATIC Criteria; Appendix B: Business Model of Information Security (BMIS); Appendix C: Capability Maturity Model (CMM); Appendix D: Example Opinion Survey Form; Appendix E: SABSA Security Attributes Table; Appendix F: Prototype Metrics Catalog; Appendix G: Effect of Weighting the PRAGMATIC Criteria; Appendix H: ISO27k Maturity Scale Metrics; Appendix I: Sample Management Survey; Appendix J: Observer Bias; Appendix K: Observer Calibration; Appendix L: Bibliography; Back Cover 330 $aOther books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to help: Security professionals syst 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aComputer security 606 $aData protection 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aData protection. 676 $a658.478 700 $aBrotby$b W. Krag.$0862239 702 $aHinson$b Gary 702 $aKabay$b Michel E. 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910818950103321 996 $aPragmatic security metrics$93968374 997 $aUNINA