Advanced Information Security Metrics
We don’t mean to imply that the metrics practices we have discussed previously are retarded as such, rather that there are even more sophisticated considerations than we have so far considered. Many of the metrics issues discussed below have their roots in well-established disciplines, such as comme...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | We don’t mean to imply that the metrics practices we have discussed previously are
retarded as such, rather that there are even more sophisticated considerations than
we have so far considered. Many of the metrics issues discussed below have their
roots in well-established disciplines, such as commerce/business management, science, and engineering. Compared to information security, or more accurately, IT268 security,* they are highly mature, tracing their histories back literally thousands
of years rather than mere decades. As information security professionals with an
interest in metrics, we have a lot to learn from our learned colleagues in other
disciplines. |
---|---|
DOI: | 10.1201/b14047-14 |