Advanced Information Security Metrics

We don’t mean to imply that the metrics practices we have discussed previously are retarded as such, rather that there are even more sophisticated considerations than we have so far considered. Many of the metrics issues discussed below have their roots in well-established disciplines, such as comme...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Brotby, W. Krag, Hinson, Gary
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:We don’t mean to imply that the metrics practices we have discussed previously are retarded as such, rather that there are even more sophisticated considerations than we have so far considered. Many of the metrics issues discussed below have their roots in well-established disciplines, such as commerce/business management, science, and engineering. Compared to information security, or more accurately, IT268 security,* they are highly mature, tracing their histories back literally thousands of years rather than mere decades. As information security professionals with an interest in metrics, we have a lot to learn from our learned colleagues in other disciplines.
DOI:10.1201/b14047-14