10
This article was downloaded by: [York University Libraries] On: 11 November 2014, At: 19:31 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Information Systems Security Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/uiss19 Implementing Security Metrics Initiatives Elizabeth A. Nichols Ph.D. a & Andrew Sudbury b a Founder, board member, and CTO for ClearPoint Metrics, Inc. b Director of security metrics design and best practices for ClearPoint Metrics, Inc. Published online: 07 Jan 2007. To cite this article: Elizabeth A. Nichols Ph.D. & Andrew Sudbury (2006) Implementing Security Metrics Initiatives, Information Systems Security, 15:5, 30-38 To link to this article: http://dx.doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95429.5 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content. This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. Terms & Conditions of access and use can be found at http:// www.tandfonline.com/page/terms-and-conditions

Implementing Security Metrics Initiatives

  • Upload
    andrew

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Implementing Security Metrics Initiatives

This article was downloaded by: [York University Libraries]On: 11 November 2014, At: 19:31Publisher: Taylor & FrancisInforma Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House,37-41 Mortimer Street, London W1T 3JH, UK

Information Systems SecurityPublication details, including instructions for authors and subscription information:http://www.tandfonline.com/loi/uiss19

Implementing Security Metrics InitiativesElizabeth A. Nichols Ph.D. a & Andrew Sudbury ba Founder, board member, and CTO for ClearPoint Metrics, Inc.b Director of security metrics design and best practices for ClearPoint Metrics, Inc.Published online: 07 Jan 2007.

To cite this article: Elizabeth A. Nichols Ph.D. & Andrew Sudbury (2006) Implementing Security Metrics Initiatives,Information Systems Security, 15:5, 30-38

To link to this article: http://dx.doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95429.5

PLEASE SCROLL DOWN FOR ARTICLE

Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) containedin the publications on our platform. However, Taylor & Francis, our agents, and our licensors make norepresentations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of theContent. Any opinions and views expressed in this publication are the opinions and views of the authors, andare not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon andshould be independently verified with primary sources of information. Taylor and Francis shall not be liable forany losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoeveror howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use ofthe Content.

This article may be used for research, teaching, and private study purposes. Any substantial or systematicreproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in anyform to anyone is expressly forbidden. Terms & Conditions of access and use can be found at http://www.tandfonline.com/page/terms-and-conditions

Page 2: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 3: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 4: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 5: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 6: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 7: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 8: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 9: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14

Page 10: Implementing Security Metrics Initiatives

Dow

nloa

ded

by [

Yor

k U

nive

rsity

Lib

rari

es]

at 1

9:31

11

Nov

embe

r 20

14