If, despite our best intentions, you find the rest of his book too theoretical, try this chapter for size. Here, we illustrate the specification, selection, and use of security metrics through a case study based on the hypothetical organization outlined below. Throughout this chapter, we refer to {example metrics} drawn from the prototype metrics catalog at Appendix F. Refer back to Chapter 7 for additional information on any that are not immediately obvious.