Information Security Metrics Paper

Improved Essays
4. Information Security Metrics
Security metrics are important to measure and evaluate the effectiveness of the security measures, and are required to provide a quantitative and unbiased basis for security operations since they aid in decision making and maintenance of security operations within an organization (Moeti & Kalema, 2014). These metrics help determine if the security components meet their objectives and also avoid doing what they weren’t intended to do. Thus, security and risk metrics play a very important role in assessing the actual state of the system security (Moeti & Kalema, 2014).
4.1 Baseline Metric Framework
Meaningful metrics are required to uniquely measure results specific to a security control and determine if it meets the security control process objectives (Hajdarevic & Allen, 2013). According to Pironti
…show more content…
An example of organization metric would be the measure of effective communication of security protocols to be followed in an organization.
• Operational Metrics – These metrics evaluate the effectiveness of the controls implemented to protect an organization’s information infrastructure. Example: Number of intrusions detected by monitoring systems.
• Technological Metrics – Measure of the effectiveness of technological controls in place to protect the organization’s IT infrastructure. Example: Number of spam emails successfully filtered by spam email filtering tool.
• Business Process Metrics – These metrics measure the impact of information security activities on the performance of a specific business process. Example: Operational cost incurred due to introduction of strong authentication process.
• Business Value Metrics – Measures the direct business impact due to information security activities. Example: Number of negative media articles published about organization’s information

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    • Malicious process monitoring: We could make use of a tool like a windows registry accesses which helps tracks all the malicious programs trying to access the system. Such a tool on the dashboard greatly benefits the user since they can try keep the system safe without any external threats entering the system without notifying the user. The real time updating of the tool in this case will be easier because the user needs to only notified of programs that require them to look at the program as fast as they can. o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Analyse how performance indicators can be used to measure practice. Performance indicators help define and measure progress towards goals set out by company this can included such things as quality of staff. Having performance indicators in place can give relevant measures within the area of their work. For example, Within the company we have annual questionnaire sent to clients where we can monitor quality and continuity in line with company compliance we then can use the data to improve our service.…

    • 162 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    nsure personal work goals, plans and activities reflect the organisations plans, and own responsibilities and accountabilities. 9. Using KPIs to determine your work performance, not only measures your personal performance but tells you what you need to accomplish and how successful you are, and help elevate your success. 10. Take frequent breaks during your work day to ensure you don't burn out and become agitated because you have lost sight on your goal.…

    • 93 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Give two examples of areas where you can identify a balanced set of measures. Chap5 The two examples where I can identify a balanced set of measures are the medical Record Review (retrospective) and health plan databases. A balanced set of measure would include outcomes, process and balancing measures. These two ways of collecting data helps leaders, stakeholders and those involved to see and evaluate how the strategic plan is performing, where improvement is needed or to get an overall picture how things are going (“Measuring Safety Improvement”, 2012).…

    • 850 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    KPI Case Study

    • 1077 Words
    • 5 Pages

    Alternate Titles 1. Frequently Overlooked KPIs Marketers Should Track 2. The KPIs Many Marketers Aren 't Tracking — But Should No one initiates a marketing activity expecting that it will cost more than the company will earn from it. However, if you do not have the right KPIs in place, you may not have accurate information on which of your efforts are providing the best return for the time and money spent. You are probably already tracking the usual KPIs, including leads generated, sales revenue and your cost per acquisition, but there are several other metrics that you could track that would make your endeavors more successful.…

    • 1077 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Methodology Having carried out an extensive search and review of literature relating to the core research topic, a number of issues have been identified. To investigate these issues and to answer the two core research objectives, it is proposed to formulate three sub-questions to the main objectives: • Which individual initiatives should be introduced to counter knowledge sharing barriers? • Which organisational metrics should be introduced to determine if an organisational change improves the knowledge sharing within the department? • Which system metrics and measurements should be introduced to monitor and ensure that the knowledge sharing strategy is being fully implemented?…

    • 1841 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Performance Measurement at DELL: Performance measurement is an important parameter which quantitatively gives information about our process, product and services. This helps us to know whether we are moving towards mission and vision or deviating from our core goals. At present big corporations don’t want to indulge into performance measurement system, instead they put their whole focus on achieving operational excellence. But Dell is very focus on measuring its supply chain efficiency on yearly basis.…

    • 2378 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    1. Information Security Program is the overall effort of the organization, which includes all projects and activities, in relation to the improvement of the information security. It can be viewed as the set of controls that an organization needs to govern. In order for program to be successful, it needs to be have a continuous lifecycle, which means that it never ends. This program has four phases, and they are: Assess, Mitigate, Validate, Sustain.…

    • 980 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Load Shedding Case Study

    • 739 Words
    • 3 Pages

    EXECUTIVE SUMMARY. Load shedding it is whereby there is no enough electricity available that Eskom should supply to its customers. Load shedding cause damage to household appliances and productivity to businesses stop due to load shedding. Load shedding is caused by a rise in population, growing economy and increased investments, a short supply of the diesel, water and weather.…

    • 739 Words
    • 3 Pages
    Decent Essays