Security metrics: replacing fear, uncertainty, and doubt
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ ; Munich [u.a.]
Addison-Wesley
2007
|
Ausgabe: | 1. print. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXVII, 306 S. Ill., graph. Darst. |
ISBN: | 0321349989 9780321349989 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022404983 | ||
003 | DE-604 | ||
005 | 20070604 | ||
007 | t | ||
008 | 070427s2007 xxuad|| |||| 00||| eng d | ||
010 | |a 2006103239 | ||
020 | |a 0321349989 |c pbk. : alk. paper |9 0-321-34998-9 | ||
020 | |a 9780321349989 |9 978-0-321-34998-9 | ||
035 | |a (OCoLC)77573101 | ||
035 | |a (DE-599)BVBBV022404983 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-945 | ||
050 | 0 | |a HD61 | |
082 | 0 | |a 658.4/7015195 | |
084 | |a QP 360 |0 (DE-625)141869: |2 rvk | ||
100 | 1 | |a Jaquith, Andrew |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security metrics |b replacing fear, uncertainty, and doubt |c Andrew Jaquith |
250 | |a 1. print. | ||
264 | 1 | |a Upper Saddle River, NJ ; Munich [u.a.] |b Addison-Wesley |c 2007 | |
300 | |a XXVII, 306 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Gestion du risque | |
650 | 4 | |a Prise de décision | |
650 | 4 | |a Risk management | |
650 | 4 | |a Decision making | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Entscheidungsfindung |0 (DE-588)4113446-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 1 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | 2 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 1 | 2 | |a Entscheidungsfindung |0 (DE-588)4113446-1 |D s |
689 | 1 | |C b |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015613564&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015613564 |
Datensatz im Suchindex
_version_ | 1804136467928186880 |
---|---|
adam_text | Contents
Foreword xv
Preface xix
Acknowledgments xxv
About the Author xxviii
Chapter I Introduction: Escaping the Hamster Wheel of Pain I
Risk Management Is Where the Confusion Is 1
Metrics Supplant Risk Management 5
Summary 7
Chapter 2 Defining Security Metrics 9
Security Measurement Business Drivers 11
Roadblocks to Data Sharing 12
Modeling Security Metrics 13
Modelers Versus Measurers 13
Quality Assurance Literature 15
Public Health Terminology and Reporting Structure 16
Portfolio Management 17
Accelerated Failure Testing 17
Insurance 18
What Makes a Good Metric? 19
Metric Defined 21
Consistently Measured 23
Cheap to Gather 23
Expressed as a Number or Percentage 24
Expressed Using at Least One Unit of Measure 25
Contextually Specific 25
What Makes a Bad Metric? 26
Inconsistently Measured 26
Cannot Be Gathered Cheaply 27
Does Not Express Results with Cardinal Numbers and Units of Measure 27
What Are Not Metrics? 28
Misuse of Security Taxonomies 28
Annualized Loss Expectancy 31
Summary 36
Chapter 3 Diagnosing Problems and Measuring Technical Security 39
Using Metrics to Diagnose Problems: A Case Study 41
Defining Diagnostic Metrics 44
Perimeter Security and Threats 46
E mail 49
Antivirus and Antispam 50
Firewall and Network Perimeter 50
Attacks 51
Coverage and Control 52
Antivirus and Antispyware 58
Patch Management 59
Host Configuration 62
Vulnerability Management 65
Availability and Reliability 68
Uptime 69
System Recovery 71
Change Control 72
Application Security 73
Black Box Defect Metrics 75
Qualitative Process Metrics and Indices 77
Code Security Metrics 83
Summary 87
Chapter 4 Measuring Program Effectiveness 89
Using COBIT, ITIL, and Security Frameworks 91
Frameworks 91
Not Useful: Asset Valuation 95
Planning and Organization 98
Assessing Risk 99
Human Resources 101
Managing Investments 102
Acquisition and Implementation 104
Identifying Solutions 104
Installing and Accrediting Solutions 107
Developing and Maintaining Procedures 111
Delivery and Support 112
Educating and Training Users 114
Ensuring System Security 117
Identifying and Allocating Costs 120
Managing Data 122
Managing Third Party Services 123
Monitoring 126
Monitoring the Process 127
Monitoring and Evaluating Internal Controls 128
Ensuring Regulatory Compliance 129
Summary 130
Chapters Analysis Techniques 133
Mean (Average) 135
Median 136
Standard Deviation 137
Grouping and Aggregation 140
Records and Attributes 140
Grouping 142
Aggregation 143
Time Series Analysis 145
Cross Sectional Analysis 147
Quartile Analysis 150
Quartile Summary Statistics 151
First Versus Fourth Analyses 152
Correlation Matrices 152
Summary 156
Chapter 6 Visualization 157
Design Principles 160
It Is About the Data, Not the Design 161
Just Say No to Three Dimensional Graphics and Cutesy Chart Junk 161
Don t Go off to Meet the Wizard 162
Erase, Erase, Erase 162
Reconsider Technicolor 163
Label Honestly and Without Contortions 164
Example 165
Stacked Bar Charts 168
Waterfall Charts 170
Time Series Charts 172
Basic Time Series Charts 172
Indexed Time Series Charts 174
Quartile Time Series Charts 175
Bivariate (X Y) Charts 177
Two Period Bivariate Charts 180
Small Multiples 181
Quartile Plot Small Multiples 183
Two by Two Matrices 185
Period Share Chart 188
Pareto Charts 191
Tables 194
Treemaps 196
Creating Treemaps 199
Thinking Like a Cannibal: the Case for Redrawing 203
A Patch Job for Ecora 203
Reorienting SecurCompass 207
Managing Threats to Readability 210
Summary 214
Chapter 7 Automating Metrics Calculations 217
Automation Benefits 218
Accuracy 219
Repeatability 219
Increased Measurement Frequency 221
Reliability 222
Transparency 222
Auditability 223
Can We Use (Insert Your Favorite Tool Here) to Automate Metrics? 224
Spreadsheets 224
Business Intelligence Tools 225
Security Event and Incident Management (SIEM) Products 225
Technical Requirements for Automation Software 227
Data Model 230
Threats 232
Exposures 233
Countermeasures 234
Assets 235
Data Sources and Sinks 236
Data Sources 237
Data Sinks 241
Data Interfaces 242
Data Source Interfaces 242
Data Sink (Presentation) Interfaces 243
Metrics Program Management 244
Implementing Metrics Automation: a Case Study 246
Summary 249
Chapter 8 Designing Security Scorecards 251
The Elements of Scorecard Style 253
Complete 253
Concise 254
Clear 255
Relevant 255
Transparent 256
The Balanced Scorecard 257
History 259
Composition 260
Flexibility of the Balanced Scorecard 262
Challenges and Benefits of the Balanced Scorecard 262
Creating the Balanced Security Scorecard 264
The Case Against Security Centric Balanced Scorecards 265
The Process of Creating the Balanced Security Scorecard 267
Financial Perspective 268
Customer Perspective 273
Internal Process Perspective 281
Learning and Growth Perspective 287
Organizational Considerations for the Balanced Security Scorecard 293
Cascading Scorecards Build Bridges 293
Balancing Accountability and Acceptance 295
Speeding Acceptance Using Mock Ups 296
Summary 298
Index 301
|
adam_txt |
Contents
Foreword xv
Preface xix
Acknowledgments xxv
About the Author xxviii
Chapter I Introduction: Escaping the Hamster Wheel of Pain I
Risk Management Is Where the Confusion Is 1
Metrics Supplant Risk Management 5
Summary 7
Chapter 2 Defining Security Metrics 9
Security Measurement Business Drivers 11
Roadblocks to Data Sharing 12
Modeling Security Metrics 13
Modelers Versus Measurers 13
Quality Assurance Literature 15
Public Health Terminology and Reporting Structure 16
Portfolio Management 17
Accelerated Failure Testing 17
Insurance 18
What Makes a Good Metric? 19
"Metric" Defined 21
Consistently Measured 23
Cheap to Gather 23
Expressed as a Number or Percentage 24
Expressed Using at Least One Unit of Measure 25
Contextually Specific 25
What Makes a Bad Metric? 26
Inconsistently Measured 26
Cannot Be Gathered Cheaply 27
Does Not Express Results with Cardinal Numbers and Units of Measure 27
What Are Not Metrics? 28
Misuse of Security Taxonomies 28
Annualized Loss Expectancy 31
Summary 36
Chapter 3 Diagnosing Problems and Measuring Technical Security 39
Using Metrics to Diagnose Problems: A Case Study 41
Defining Diagnostic Metrics 44
Perimeter Security and Threats 46
E mail 49
Antivirus and Antispam 50
Firewall and Network Perimeter 50
Attacks 51
Coverage and Control 52
Antivirus and Antispyware 58
Patch Management 59
Host Configuration 62
Vulnerability Management 65
Availability and Reliability 68
Uptime 69
System Recovery 71
Change Control 72
Application Security 73
Black Box Defect Metrics 75
Qualitative Process Metrics and Indices 77
Code Security Metrics 83
Summary 87
Chapter 4 Measuring Program Effectiveness 89
Using COBIT, ITIL, and Security Frameworks 91
Frameworks 91
Not Useful: Asset Valuation 95
Planning and Organization 98
Assessing Risk 99
Human Resources 101
Managing Investments 102
Acquisition and Implementation 104
Identifying Solutions 104
Installing and Accrediting Solutions 107
Developing and Maintaining Procedures 111
Delivery and Support 112
Educating and Training Users 114
Ensuring System Security 117
Identifying and Allocating Costs 120
Managing Data 122
Managing Third Party Services 123
Monitoring 126
Monitoring the Process 127
Monitoring and Evaluating Internal Controls 128
Ensuring Regulatory Compliance 129
Summary 130
Chapters Analysis Techniques 133
Mean (Average) 135
Median 136
Standard Deviation 137
Grouping and Aggregation 140
Records and Attributes 140
Grouping 142
Aggregation 143
Time Series Analysis 145
Cross Sectional Analysis 147
Quartile Analysis 150
Quartile Summary Statistics 151
First Versus Fourth Analyses 152
Correlation Matrices 152
Summary 156
Chapter 6 Visualization 157
Design Principles 160
It Is About the Data, Not the Design 161
Just Say No to Three Dimensional Graphics and Cutesy Chart Junk 161
Don't Go off to Meet the Wizard 162
Erase, Erase, Erase 162
Reconsider Technicolor 163
Label Honestly and Without Contortions 164
Example 165
Stacked Bar Charts 168
Waterfall Charts 170
Time Series Charts 172
Basic Time Series Charts 172
Indexed Time Series Charts 174
Quartile Time Series Charts 175
Bivariate (X Y) Charts 177
Two Period Bivariate Charts 180
Small Multiples 181
Quartile Plot Small Multiples 183
Two by Two Matrices 185
Period Share Chart 188
Pareto Charts 191
Tables 194
Treemaps 196
Creating Treemaps 199
Thinking Like a Cannibal: the Case for Redrawing 203
A Patch Job for Ecora 203
Reorienting SecurCompass 207
Managing Threats to Readability 210
Summary 214
Chapter 7 Automating Metrics Calculations 217
Automation Benefits 218
Accuracy 219
Repeatability 219
Increased Measurement Frequency 221
Reliability 222
Transparency 222
Auditability 223
Can We Use (Insert Your Favorite Tool Here) to Automate Metrics? 224
Spreadsheets 224
Business Intelligence Tools 225
Security Event and Incident Management (SIEM) Products 225
Technical Requirements for Automation Software 227
Data Model 230
Threats 232
Exposures 233
Countermeasures 234
Assets 235
Data Sources and Sinks 236
Data Sources 237
Data Sinks 241
Data Interfaces 242
Data Source Interfaces 242
Data Sink (Presentation) Interfaces 243
Metrics Program Management 244
Implementing Metrics Automation: a Case Study 246
Summary 249
Chapter 8 Designing Security Scorecards 251
The Elements of Scorecard Style 253
Complete 253
Concise 254
Clear 255
Relevant 255
Transparent 256
The Balanced Scorecard 257
History 259
Composition 260
Flexibility of the Balanced Scorecard 262
Challenges and Benefits of the Balanced Scorecard 262
Creating the Balanced Security Scorecard 264
The Case Against "Security Centric" Balanced Scorecards 265
The Process of Creating the Balanced Security Scorecard 267
Financial Perspective 268
Customer Perspective 273
Internal Process Perspective 281
Learning and Growth Perspective 287
Organizational Considerations for the Balanced Security Scorecard 293
Cascading Scorecards Build Bridges 293
Balancing Accountability and Acceptance 295
Speeding Acceptance Using Mock Ups 296
Summary 298
Index 301 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Jaquith, Andrew |
author_facet | Jaquith, Andrew |
author_role | aut |
author_sort | Jaquith, Andrew |
author_variant | a j aj |
building | Verbundindex |
bvnumber | BV022404983 |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61 |
callnumber-search | HD61 |
callnumber-sort | HD 261 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_rvk | QP 360 |
ctrlnum | (OCoLC)77573101 (DE-599)BVBBV022404983 |
dewey-full | 658.4/7015195 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/7015195 |
dewey-search | 658.4/7015195 |
dewey-sort | 3658.4 77015195 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02079nam a2200553zc 4500</leader><controlfield tag="001">BV022404983</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070604 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070427s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006103239</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321349989</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">0-321-34998-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321349989</subfield><subfield code="9">978-0-321-34998-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)77573101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022404983</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-945</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD61</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/7015195</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 360</subfield><subfield code="0">(DE-625)141869:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jaquith, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security metrics</subfield><subfield code="b">replacing fear, uncertainty, and doubt</subfield><subfield code="c">Andrew Jaquith</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ ; Munich [u.a.]</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVII, 306 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Prise de décision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Decision making</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entscheidungsfindung</subfield><subfield code="0">(DE-588)4113446-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Entscheidungsfindung</subfield><subfield code="0">(DE-588)4113446-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015613564&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015613564</subfield></datafield></record></collection> |
id | DE-604.BV022404983 |
illustrated | Illustrated |
index_date | 2024-07-02T17:19:42Z |
indexdate | 2024-07-09T20:56:52Z |
institution | BVB |
isbn | 0321349989 9780321349989 |
language | English |
lccn | 2006103239 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015613564 |
oclc_num | 77573101 |
open_access_boolean | |
owner | DE-945 |
owner_facet | DE-945 |
physical | XXVII, 306 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Jaquith, Andrew Verfasser aut Security metrics replacing fear, uncertainty, and doubt Andrew Jaquith 1. print. Upper Saddle River, NJ ; Munich [u.a.] Addison-Wesley 2007 XXVII, 306 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Gestion du risque Prise de décision Risk management Decision making Risikomanagement (DE-588)4121590-4 gnd rswk-swf Entscheidungsfindung (DE-588)4113446-1 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Unternehmen (DE-588)4061963-1 s Risikoanalyse (DE-588)4137042-9 s Risikomanagement (DE-588)4121590-4 s DE-604 Entscheidungsfindung (DE-588)4113446-1 s b DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015613564&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Jaquith, Andrew Security metrics replacing fear, uncertainty, and doubt Gestion du risque Prise de décision Risk management Decision making Risikomanagement (DE-588)4121590-4 gnd Entscheidungsfindung (DE-588)4113446-1 gnd Risikoanalyse (DE-588)4137042-9 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4113446-1 (DE-588)4137042-9 (DE-588)4061963-1 |
title | Security metrics replacing fear, uncertainty, and doubt |
title_auth | Security metrics replacing fear, uncertainty, and doubt |
title_exact_search | Security metrics replacing fear, uncertainty, and doubt |
title_exact_search_txtP | Security metrics replacing fear, uncertainty, and doubt |
title_full | Security metrics replacing fear, uncertainty, and doubt Andrew Jaquith |
title_fullStr | Security metrics replacing fear, uncertainty, and doubt Andrew Jaquith |
title_full_unstemmed | Security metrics replacing fear, uncertainty, and doubt Andrew Jaquith |
title_short | Security metrics |
title_sort | security metrics replacing fear uncertainty and doubt |
title_sub | replacing fear, uncertainty, and doubt |
topic | Gestion du risque Prise de décision Risk management Decision making Risikomanagement (DE-588)4121590-4 gnd Entscheidungsfindung (DE-588)4113446-1 gnd Risikoanalyse (DE-588)4137042-9 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Gestion du risque Prise de décision Risk management Decision making Risikomanagement Entscheidungsfindung Risikoanalyse Unternehmen |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015613564&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jaquithandrew securitymetricsreplacingfearuncertaintyanddoubt |