Amazon cover image
Image from Amazon.com

How to measure anything in cybersecurity risk / Douglas W. Hubbard, Richard Seiersen.

By: Contributor(s): Material type: TextTextPublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., [2023]Edition: Second editionDescription: 1 online resource (xv, 345 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119892335 (electronic bk.)
  • 1119892333 (electronic bk.)
Subject(s): Additional physical formats: ebook version :: No title; No titleDDC classification:
  • 658.478 23
LOC classification:
  • HV6773.15.C97 H835 2023
Online resources:
Contents:
Part I: Why Cybersecurity Needs Better Measurements for Risk. Chapter 1: The One Patch Most Needed in Cybersecurity. Chapter 2: A Measurement Primer for Cybersecurity. Chapter 3: The Rapid Risk Audit: Starting With A Simple Quantitative Risk Model. Chapter 4: The Single Most Important Measurement in Cybersecurity. Chapter 5: Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Part II: Evolving the Model of Cybersecurity Risk. Chapter 6: Decompose It: Unpacking the Details. Chapter 7: Calibrated Estimates: How Much Do You Know Now? Chapter 8: Reducing Uncertainty with Bayesian Methods. Chapter 9: Some Powerful Methods Based on Bayes -- Part III: Cybersecurity Risk Management for the Enterprise. Chapter 10: Toward Security Metrics Maturity. Chapter 11: How Well Are My Security Investments Working Together? Chapter 12: A Call to Action: How to Roll Out Cybersecurity Risk Management.
No physical items for this record

Includes bibliographical references and index.

Part I: Why Cybersecurity Needs Better Measurements for Risk. Chapter 1: The One Patch Most Needed in Cybersecurity. Chapter 2: A Measurement Primer for Cybersecurity. Chapter 3: The Rapid Risk Audit: Starting With A Simple Quantitative Risk Model. Chapter 4: The Single Most Important Measurement in Cybersecurity. Chapter 5: Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Part II: Evolving the Model of Cybersecurity Risk. Chapter 6: Decompose It: Unpacking the Details. Chapter 7: Calibrated Estimates: How Much Do You Know Now? Chapter 8: Reducing Uncertainty with Bayesian Methods. Chapter 9: Some Powerful Methods Based on Bayes -- Part III: Cybersecurity Risk Management for the Enterprise. Chapter 10: Toward Security Metrics Maturity. Chapter 11: How Well Are My Security Investments Working Together? Chapter 12: A Call to Action: How to Roll Out Cybersecurity Risk Management.

Electronic reproduction. Hoboken, N.J. Available via World Wide Web.

Description based on print version record.

Powered by Koha