Security Metrics, A Beginner's Guide

Security Metrics, A Beginner's Guide

Wong, Caroline

McGraw-Hill Education - Europe

11/2011

432

Mole

Inglês

9780071744003

15 a 20 dias

743

Descrição não disponível.
Part I: Why Security Metrics
Chapter 1 Why Measure Security?
Chapter 2 Why Now Security Metrics Are Needed Now
Part II: Essential Components of an Effective Security Metrics Practitioner
Chapter 3 Analytics
Chapter 4 Commitment to Project Management
Part III: Decide What to Measure
Chapter 5 Identify Core Competencies, Information Security Work, and Resourcing Options
Chapter 6 Identify Targets
Part IV: Get Started
Chapter 7 Defining Project Objectives
Chapter 8 Define Your Priorities
Chapter 9 Identify Key Messages and Key Audiences
Chapter 10 Obtain Buy-In from Stakeholders
Part V: Toolkit
Chapter 11 Automation
Chapter 12 Analysis Technology and a Case Study
Part VI: Creating the Best Environment for Healthy Metrics
Chapter 13 Define a Communications Strategy
Chapter 14 Create and Drive an Action Plan: The Importance of Project Management
Part VII: Secret Sauce: Lessons Learned from an Enterprise Practitioner
Chapter 15 Improving Data Quality and Presentation
Chapter 16 Resourcing Security Metrics Projects
Part VIII: Looking Forward
Chapter 17 Security Metrics for Cloud Computing
Part IX: Appendix and Glossary
Appendix A Templates and Checklists
Glossary
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
secure, metrics, beginner, guide, Caroline Wong, eBay, security, why, volumes, bots, now, essential, components, effective, practitioner, analytics, discipline, commitment, project, management, decide, what, measure, core, identify, targets, started, define, objectives, goals, priorities, identify, key, messages, audiences, obtain, buy-in, stakeholders, commit, timelines, toolkit, center, information, CIS, consensus, definitions, case, study, analysis, technology, samples, creating, best, environment, healthy, communications, strategy, drive, create, action, plan, importance, secret, sauce, lessons, learned, enterprise, enhance, process, optimization, data, quality, fix, broke, before, automation, appendices, glossary, terms, checklists, templates, prominent, easy-to-use, budget, constraints, tight, cybercriminals, groups, funded, protected, educated, threat, sophisticated, meaningful, networks, web sites, maturity, elements, feedback, loops, improvement, leveraging, prevention, techniques, guru, global, RSA, Metricon, Executive Women's Forum, Archer Summits, Cloud Security Alliance, Security, networking, Hacking Exposed, Hacking Exposed Web 2.0, Hacking Exposed VoIP, Hacking Exposed Windows, Hacking Exposed Web Applications, Hacking Exposed Cisco Networks, Gray Hat Hacking, Hacking Exposed Wireless, Hacking Exposed Computer Forensics, 19 Deadly Sins of Software Security, 24 Deadly Sins of Software Security, CCNA Cisco Certified Network Associate Study Guide, CCENT Cisco Certified Entry Networking Technician Study Guide, CCNA Cisco Certified Network Associate Wireless Study Guide, CISSP All-in-One Exam Guide, Mobile Application Security, Hacking Exposed Malware and Rootkits, Hacking Exposed Computer Forensics, Hacking Exposed Virtualization & Cloud Computing, IT Security Metrics, Security Information and Event Management (SIEM) Implementation, IT Auditing