Security Performance Measurement

Messung und Wertbeitragsermittlung von Leistungen der Unternehmenssicherheit

Author: Jürgen Harrer

Publisher: LIT Verlag Münster

ISBN: 3643137265


Page: 309

View: 9849


Development of an IT-Security Performance Measurement System

Author: Michael Scheer


ISBN: 3832467882

Category: Business & Economics

Page: 83

View: 9739

Inhaltsangabe:Abstract: Adequate security of information and the systems that process it is a fundamental management responsibility. Management must understand the current status of their IT-Security program in order to make informed decisions. In this context, this Bachelor Thesis proposes a Performance Measurement System for IT-Security, which is designed to be well-balanced and comprehensive. It views IT-Security from four perspectives: Organisational, Financial, Operational and Personnel. The documentation of the system contains the key figures and their interrelationships. With its modular design, it can either be used out-off-the-box or tailored to the specific requirements of the organisation. Chapter 1 briefly discusses the reason for this Bachelor Thesis and introduces the problem statement. Chapter 2 explores the basic concepts behind both IT-Security and performance measurement. Chapter 3 covers general requirements, which are fundamental principles needed to be taken into consideration when building an IT-Security Performance Measurement System. Chapter 4 describes the approach taken for the design of the system. Chapter 5 introduces the Performance Measurement System for IT-Security. Inhaltsverzeichnis:Table of Contents: 1.Introduction1 1.1Motivation1 1.2Problem Statement2 2.Theoretical Background3 2.1Performance Measurement4 2.1.1Definitions4 2.1.2Key Figures4 2.1.3The Balanced Scorecard6 2.2IT-Security7 2.2.1Goals of IT-Security7 2.2.2Security Policy9 2.2.3Incident Response10 2.3Risk Management11 2.3.1The Asset/Threat/Vulnerability/Safeguard Concept11 2.3.2Risk Assessment12 2.3.3Risk Mitigation13 2.4Existing Standards for IT-Security14 2.4.1Standards for Information Security Management14 2.4.2Standards for Evaluation15 2.4.3Standards for Development15 2.4.4Standards for a Common Terminology16 3.Requirements19 3.1General Requirements20 3.1.1Financial Requirements20 3.1.2Regulatory Requirements20 3.1.3Organisational Requirements20 3.1.4Requirements for Performance Measurement21 3.2Requirements at a Glance22 4.Development Approach23 4.1Top-Down vs. Bottom-Up23 4.1.1Top-Down23 4.1.2Bottom-Up24 4.1.3Comparison26 4.2Development Approach chosen26 5.Findings29 5.1Top-Down Findings30 5.1.1Generic Security Model30 5.1.2Self-Assessment Guide31 5.1.3Findings and Discussion34 5.2Bottom-Up Findings36 5.2.1List of Key Figures36 5.2.2Relationships38 5.3Meet in the Middle39 5.4Discussion of Key [...]

Aviation Security

Screener Training and Performance Measurement Strengthened, But More Work Remains

Author: Cathleen A. Berrick

Publisher: DIANE Publishing

ISBN: 9780756748944


Page: 60

View: 525

The screening of airport passengers & their checked baggage is a critical component in securing our nation's commercial aviation system. This report incorporates results from a survey of 155 Federal Security Directors -- the ranking Transportation Security Admin. (TSA) authority responsible for the leadership & coordination of TSA security activities at the nation's commercial airports. This report addresses: (1) actions TSA has taken to enhance training for passenger & checked baggage screeners & screening supervisors, (2) how TSA ensures that screeners complete required training, & (3) actions TSA has taken to measure & enhance screener performance in detecting threat objects. Charts & tables.

Discerning President Obama's National Security Strategy

Author: Kristen Boon

Publisher: Oceana Publications

ISBN: 0199758204

Category: Political Science

Page: 624

View: 898

Volume 112 of Terrorism: Commentary on Security Documents, Discerning President Obama's National Defense Strategy, makes available documents from the first fifteen months of the Obama administration that provide insights into its developing national defense strategy. Included are documents specifically relating to the U.S. Department of Defense and the nation's armed forces. Included is the February 2010 Quadrennial Defense Review Report of the Department of Defense, one of the most significant documents providing insight into the defense component of national security. General Editor Douglas Lovelace, an expert in U.S. military matters, elucidates the complexities of military spending and of counter-insurgency tactics. Also included are reports detailing the strategy and performance of government agencies involved in the security effort, such as the Department of Homeland Security. These reports shed light on internal department assessments as well as external evaluations. Finally, strategy documents produced by the U.S. armed forces describe the national security policy being implemented by the nation's senior military leaders. Researchers will benefit from the focused and comprehensive nature of these reports.

Homeland Security

Actions Needed to Improve Security Practices at National Icons and Parks

Author: Mark L. Goldstein

Publisher: DIANE Publishing

ISBN: 1437923321


Page: 52

View: 1523

The September 11 terrorist attacks have heightened concerns about the security of the nation's icons and parks, which millions of people visit every year. The National Park Service (NPS) within the Dept. of the Interior is responsible for securing nearly 400 park units that include icons and other parks. In 2004, an audit identified a set of key protection practices that include: allocating resources using risk management, leveraging technology, information sharing and coordination, performance measurement and testing, and strategic management of human capital. This report determined whether the NPS¿s security efforts for national icons and parks reflected key practices. Includes recommendations. Charts and tables.

Information Security

Concerted Effort Needed to Improve Federal Performance Measures

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

ISBN: 1437925405


Page: 49

View: 5798

Information security is a critical consideration for federal agencies, which depend on information systems to carry out their missions. Increases in reports of security incidents demonstrate the urgency of adequately protecting the federal government's data and information systems. This report: (1) describes key types and attributes of performance measures; (2) identifies practices of leading organizations for developing and using measures to guide and monitor information security activities; (3) identifies the measures used by federal agencies and how they are developed; and (4) assesses the federal government's practices for informing Congress on the effectiveness of information security programs. Includes recommend. Illus.

Protecting Transportation

Implementing Security Policies and Programs

Author: R William Johnstone

Publisher: Butterworth-Heinemann

ISBN: 0124079288

Category: Political Science

Page: 398

View: 3452

Protecting Transportation: Implementing Security Policies and Programs provides a thorough overview of transportation security in the United States, with a focus on policy. The book coversall major transportation modes and puts the American security system into perspective against other national and international systems. Author R. William Johnstone, a transportation security expert and member of the 9/11 Commission staff, discusses how the current transportation security system came to be and how it is performing. Whether you are a current or aspiring transportation security professional, a policymaker, or an engaged citizen, Johnstone’s presentation equips you to understand today’s issues and debates on a problem that affects every member of the global community. Transportation security has evolved in the years since 9/11 from a relatively modest, sporadic undertaking into a multi-billion dollar enterprise employing tens of thousands. Protecting Transportation describes how that system is organized, funded, and implemented. Fosters critical thinking by reviewing the development and evaluation of key transportation security programs Clarifies security issues in the context of civil liberties, federal spending, and terrorist incidents in the United States and globally Considers the “inputs of security policy, including laws, regulations, and programs; and the “outcomes, such as enforcement, effectiveness metrics, and workforce morale

Fixes That Last - The Executive's Guide To Fix It Or Lose It Management

Author: Eugene A. Razzetti, CMC

Publisher: AuthorHouse

ISBN: 1449085792

Category: Business & Economics

Page: 284

View: 2603

This book is about what I call “Fix it or lose it Management”. I wrote it to help you do your own turnaround inside your organization, before someone else does it for you – or your organization goes under completely. This book is a compendium of carefully selected good ideas from good books, plus my own experience in nearly 20 years as a management consultant and the 27 years of Military service that preceded it. Like my last book, I wrote it so that you could have straightforward, no-nonsense material, ready to implement. CEOs and other responsible people in leadership positions don’t always have time to do their own research. Instead, they throw themselves on the mercy of contractors, who think in terms of yearly contracts. You can do the job better.

Pipeline Security

TSA Has Taken Actions to Help Strengthen Security, But Could Improve Priority-Setting and Assessment Processes

Author: Stephen M. Lord

Publisher: DIANE Publishing

ISBN: 1437938795


Page: 77

View: 3074

The U.S. depends on a vast network of pipelines to transport energy. This report reviewed the Transportation Security Administration's (TSA) efforts to help ensure pipeline security. It addresses the extent to which TSA's Pipeline Security Division (PSD) has: (1) assessed risk and prioritized efforts to help strengthen pipeline security; (2) implemented agency guidance and requirements of the Implementing Recommendations of the 9/11 Commission Act of 2007 regarding pipeline security; and (3) measured its performance in strengthening pipeline security. The report reviewed PSD's risk assessment process and performance measures and observed 14 PSD reviews and inspections scheduled during the period of this review. Charts and tables.

Measures and Metrics in Corporate Security

Author: George Campbell

Publisher: Elsevier

ISBN: 012800715X

Category: Business & Economics

Page: 176

View: 3910

The revised second edition of Measures and Metrics in Corporate Security is an indispensable guide to creating and managing a security metrics program. Authored by George Campbell, emeritus faculty of the Security Executive Council and former chief security officer of Fidelity Investments, this book shows how to improve security’s bottom line and add value to the business. It provides a variety of organizational measurements, concepts, metrics, indicators and other criteria that may be employed to structure measures and metrics program models appropriate to the reader’s specific operations and corporate sensitivities. There are several hundred examples of security metrics included in Measures and Metrics in Corporate Security, which are organized into categories of security services to allow readers to customize metrics to meet their operational needs. Measures and Metrics in Corporate Security is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Describes the basic components of a metrics program, as well as the business context for metrics Provides guidelines to help security managers leverage the volumes of data their security operations already create Identifies the metrics security executives have found tend to best serve security’s unique (and often misunderstood) missions Includes 375 real examples of security metrics across 13 categories

Information Security Practice and Experience

First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

Author: Robert H. Deng,Feng Bao,HweeHwa Pang,Jianying Zhou

Publisher: Springer Science & Business Media

ISBN: 9783540255840

Category: Business & Economics

Page: 424

View: 7886

This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005. The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies.

Homeland Security

Management Challenges Facing Federal Leadership

Author: Patricia A. Dalton

Publisher: DIANE Publishing

ISBN: 9780756734695


Page: 78

View: 9383

This is a review of governmentwide changes and challenges prevalent in the missions and activities of agencies involved in homeland security, including the coordination and collaboration required to meet overall goals and needs, and government's efforts in planning and implementing strategic, transitional, and human capital activities designed to reorganize and strengthen homeland security. The federal government's response on homeland security issues is still evolving. The federal government's efforts to improve homeland security will require a results-oriented approach to ensure mission accountability and sustainability over time. Charts and tables.

Measuring Food Insecurity and Hunger

Phase 1 Report

Author: National Research Council,Division of Behavioral and Social Sciences and Education,Committee on National Statistics,Panel to Review U.S Department of Agriculture's Measurement of Food Insecurity and Hunger

Publisher: National Academies Press

ISBN: 0309095964

Category: Medical

Page: 80

View: 2784


Investment Performance Measurement

Evaluating and Presenting Results

Author: Philip Lawton, CIPM,Todd Jankowski, CFA

Publisher: John Wiley & Sons

ISBN: 9780470473719

Category: Business & Economics

Page: 984

View: 565

Investment Performance Measurement Over the past two decades, the importance of measuring, presenting, and evaluating investment performance results has dramatically increased. With the growth of capital market data services, the development of quantitative analytical techniques, and the widespread acceptance of Global Investment Performance Standards (GIPS®), this discipline has emerged as a central component of effective asset management and, thanks in part to the Certificate in Investment Performance Measurement (CIPM) program, has become a recognized area of specialization for investment professionals. That's why Investment Performance Measurement: Evaluating and Presenting Results—the second essential title in the CFA Institute Investment Perspectives series—has been created. CFA Institute has a long tradition of publishing content from industry thought leaders, and now this new collection offers unparalleled guidance to those working in the rapidly evolving field of investment management. Drawing from the Research Foundation of CFA Institute, the Financial Analysts Journal, CFA Institute Conference Proceedings Quarterly, CFA Magazine, and the CIPM curriculum, this reliable resource taps into the vast store of knowledge of some of today's most prominent thought leaders—from industry professionals to respected academics—who have focused on investment performance evaluation for a majority of their careers. Divided into five comprehensive parts, this timely volume opens with an extensive overview of performance measurement, attribution, and appraisal. Here, you'll become familiar with everything from the algebra of time-weighted and money-weighted rates of return to the objectives and techniques of performance appraisal. After this informative introduction, Investment Performance Measurement moves on to: Provide a solid understanding of the theoretical grounds for benchmarking and the trade-offs encountered during practice in Part II: Performance Measurement Describe the different aspects of attribution analysis as well as the determinants of portfolio performance in Part III: Performance Attribution Address everything from hedge fund risks and returns to fund management changes and equity style shifts in Part IV: Performance Appraisal Recount the history and explain the provisions of the GIPS standards—with attention paid to the many practical issues that arise in the course of its implementation—in Part V: Global Investment Performance Standards Filled with invaluable insights from more than fifty experienced contributors, this practical guide will enhance your understanding of investment performance measurement and put you in a better position to present and evaluate results in the most effective way possible.

Public Transportation Security

Author: John N. Balog

Publisher: Transportation Research Board

ISBN: 0309098998

Category: Emergency management

Page: 67

View: 5276