xuezhiqian123
Geregistreerd op: 16 Jul 2018 Berichten: 2692
|
Geplaatst: 21-11-2019 10:38:33 Onderwerp: been settled in South Easton and off |
|
|
Many people find the idea of creating Information Security Metrics to be a daunting task. This article will help you by reviewing what is required to create a set of meaningful metrics for your Information Security Program.
A number of years ago I was working on an information security strategy and was asked to create the metrics to measure the success of our Information Security program. I was given the name of our local specialist on results analysis and asked her "How can we measure the success of our information security program?". Her immediate response was "What are your objectives?". That reply took me a bit by surprise but what she was asking me Jake Bailey Jersey , basically, was "How can you tell when you get there if you don't know where you're going?" A bit like the Cheshire Cat in Alice in Wonderland who told her it didn't matter much which road she took if she didn't know where she was going.
As an answer to her I proudly replied "Our objective is to ensure that our information is secure!". The next question of course is what are all the steps (the road map) to get there; i.e. the intermediate objectives? This would require ensuring that all staff were aware of the need for information security, and providing them with the standards Hjalte Froholdt Jersey , guidelines, forms, and procedures to identify the right security controls required.
In this context then the term "metrics" refers to specific objectives that have defined measurements (i.e. Objective+Measurement=Metric).
The overall objective of the Information Security Strategy is: "1. Ensure the proper risk management of information assets." This objective would be supported by an information security policy such as: "Personnel must recognize that information is a valuable corporate asset and therefore must be protected accordingly." It was at that point that I went away and took a close look at the strategy we had in place and realized I could create a summary of the whole thing that consisted of about 12 intermediate objectives we had to meet to ensure our information was secure.
An example of one of the intermediate objectives to meet this main objective would be: "6. All departments have a documented inventory of their information assets."
The metrics we developed for these two objectives are as follows (note the type of measurement required for each objective).
Objective #1: Ensure the proper risk management of information assets.
Measurement 1: A roll-up of the secondary objectives #2 through #12.
Measurement 2: Total potential dollar impact of all outstanding risks rated as "High".
at your money should not spoil and the future of should lies in the secure hand. You should go online in order to reach the perfect institute and never come in the deadlock condition. Do not worry more and rely on one of the prestigious institutes, which have a specialization to provide numerous courses to the candidates. This institute has been settled in South Easton and offers a bouquet of course ranging from cosmetology, culinary art Stephon Gilmore Jersey , financial Aid consultant.
The main aim of their institute is to give education in such a way that is useful for lifelong. They are offering Nursing Program Brockton to students within the guidance of li. Cheap Jerseys Cheap Jerseys From China Wholesale Soccer Shirts China Wholesale NHL Hats China Cheap NFL Jerseys Cheap College Hats Cheap College Shirts Cheap Basketball Hats Cheap NBA Hats Cheap Baseball Hats |
|