About This Chapter
Information Security Performance Metrics - Chapter Summary
This chapter is filled with bite-sized lessons you can study anytime to learn more about information security performance metrics. Created by experienced instructors, the lessons closely examine a variety of topics, including KPIs, benchmarking and the security metrics program. Enjoy the flexibility this chapter offers by navigating the lessons in any order and visiting as often as you'd like. Around-the-clock mobile access enables you to study during the timeframes you desire via any smartphone or tablet. If you'd like to confirm your knowledge of the lessons, don't hesitate to take our multiple-choice quizzes and chapter exam. When you're finished, you will be ready to:
- Provide examples of information security metrics
- List the steps in building a security metrics program
- Detail the history of the ISO/IEC 27004
- Differentiate between strategic, risk management and operational security KPIs
- Define and list types of benchmarking
1. Information Security Metrics: Examples & Overview
Information security metrics is a powerful measurement system that helps us justify or refute company expenditure. In this lesson, we'll see what it is, and examine two kinds of metrics: quantitative and qualitative.
2. Building a Security Metrics Program: Steps & Examples
Building a security metrics program starts with identifying key stakeholders and continues by constantly reassessing the program's effectiveness. In this lesson, you'll learn more about setting up this program.
3. ISO/IEC 27004: History & Overview
Measuring the results of your security program can be achieved using a standard known as ISO/IEC 27004. Learn more about what this is and how it can improve your security and security program.
4. KPIs: Strategic, Risk Management & Operational Security
Key performance indicators are a good tool for many areas of business, including information security. In this lesson, you'll learn more about KPIs in information security and examples of KPIs in strategy, risk, and security.
5. What is Benchmarking? - Definition, Types, Process & Examples
Companies use benchmarking as a way to compare key metrics to other businesses in the industry. This allows companies to see how well they are performing and identify ways they can become more competitive in the industry. In this lesson, we will look at the different types of benchmarking, the stages of benchmarking, and a real world example.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- The Cybersecurity Threat Landscape
- Information Security Policy
- Information Security Strategy Development
- Cybersecurity Policy, Governance & Management
- Cybersecurity Risk Management
- Data Access Control
- Partner & Vendor Security Management
- Security Awareness Training
- Information Security Compliance
- Required Assignments for Computer Science 332