ABSTRACT

If, despite our best intentions, you find the rest of his book too theoretical, try this chapter for size. Here, we illustrate the specification, selection, and use of security metrics through a case study based on the hypothetical organization outlined below. Throughout this chapter, we refer to {example metrics} drawn from the prototype metrics catalog at Appendix F. Refer back to Chapter 7 for additional information on any that are not immediately obvious.