How to Measure Anything in Cybersecurity Risk

Höfundur Douglas W. Hubbard; Richard Seiersen; Daniel E. Geer Jr.; Stuart McClure

Útgefandi Wiley Professional Development (P&T)

Snið ePub

Print ISBN 9781119085294

Útgáfa 1

Útgáfuár 2016

4.090 kr.

Description

Efnisyfirlit

  • Foreword
  • Note
  • Foreword
  • Acknowledgments
  • About the Authors
  • Introduction
  • Why This Book, Why Now?
  • What Is This Book About?
  • What to Expect
  • Is This Book for Me?
  • We Need More Than Technology
  • New Tools for Decision Makers
  • Our Path Forward
  • PART I: Why Cybersecurity Needs Better Measurements for Risk
  • Chapter 1: The One Patch Most Needed in Cybersecurity
  • The Global Attack Surface
  • The Cyber Threat Response
  • A Proposal for Cybersecurity Risk Management
  • Notes
  • Chapter 2: A Measurement Primer for Cybersecurity
  • The Concept of Measurement
  • The Object of Measurement
  • The Methods of Measurement
  • Notes
  • Chapter 3: Model Now!: An Introduction to Practical Quantitative Methods for Cybersecurity
  • A Simple One-for-One Substitution
  • The Expert as the Instrument
  • Doing “Uncertainty Math”
  • Visualizing Risk
  • Supporting the Decision: A Return on Mitigation
  • Where to Go from Here
  • Notes
  • Chapter 4: The Single Most Important Measurement in Cybersecurity
  • The Analysis Placebo: Why We Can’t Trust Opinion Alone
  • How You Have More Data Than You Think
  • When Algorithms Beat Experts
  • Tools for Improving the Human Component
  • Summary and Next Steps
  • Notes
  • Chapter 5: Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk
  • Scanning the Landscape: A Survey of Cybersecurity Professionals
  • What Color Is Your Risk? The Ubiquitous—and Risky—Risk Matrix
  • Exsupero Ursus and Other Fallacies
  • Conclusion
  • Notes
  • PART II: Evolving the Model of Cybersecurity Risk
  • Chapter 6: Decompose It: Unpacking the Details
  • Decomposing the Simple One-for-One Substitution Model
  • More Decomposition Guidelines: Clear, Observable, Useful
  • A Hard Decomposition: Reputation Damage
  • Conclusion
  • Notes
  • Chapter 7: Calibrated Estimates: How Much Do You Know Now?
  • Introduction to Subjective Probability
  • Calibration Exercise
  • Further Improvements on Calibration
  • Conceptual Obstacles to Calibration
  • The Effects of Calibration
  • Notes
  • Answers to Trivia Questions for Calibration Exercise
  • Chapter 8: Reducing Uncertainty with Bayesian Methods
  • A Major Data Breach Example
  • A Brief Introduction to Bayes and Probability Theory
  • Bayes Applied to the Cloud Breach Use Case
  • Note
  • Chapter 9: Some Powerful Methods Based on Bayes
  • Computing Frequencies with (Very) Few Data Points: The Beta Distribution
  • Decomposing Probabilities with Many Conditions
  • Reducing Uncertainty Further and When To Do It
  • Leveraging Existing Resources to Reduce Uncertainty
  • Wrapping Up Bayes
  • Notes
  • PART III: Cybersecurity Risk Management for the Enterprise
  • Chapter 10: Toward Security Metrics Maturity
  • Introduction: Operational Security Metrics Maturity Model
  • Sparse Data Analytics
  • Functional Security Metrics
  • Security Data Marts
  • Prescriptive Analytics
  • Notes
  • Chapter 11: How Well Are My Security Investments Working Together?
  • Addressing BI Concerns
  • Just the Facts: What Is Dimensional Modeling and Why Do I Need It?
  • Dimensional Modeling Use Case: Advanced Data Stealing Threats
  • Modeling People Processes
  • Chapter 12: A Call to Action: How to Roll Out Cybersecurity Risk Management
  • Establishing the CSRM Strategic Charter
  • Organizational Roles and Responsibilities for CSRM
  • Getting Audit to Audit
  • What the Cybersecurity Ecosystem Must Do to Support You
  • Can We Avoid the Big One?
  • Appendix A: Selected Distributions
  • Distribution Name: Triangular
  • Distribution Name: Binary
  • Distribution Name: Normal
  • Distribution Name: Lognormal
  • Distribution Name: Beta
  • Distribution Name: Power Law
  • Distribution Name: Truncated Power Law
  • Appendix B: Guest Contributors
  • Appendix B Contents
  • Aggregating Data Sources for Cyber Insights
  • Forecasting—and Reducing—Occurrence of Espionage Attacks
  • Skyrocketing Breaches?
  • Financial Impact of Breaches
  • The Flaw of Averages in Cyber Security
  • Botnets
  • Password Hacking
  • Cyber-CI
  • How Catastrophe Modeling Can Be Applied to Cyber Risk
  • Notes
  • Index
  • EULA
Show More

Additional information

Veldu vöru

Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “How to Measure Anything in Cybersecurity Risk”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð