{"title":"衡量安全方面的投资回报率","authors":"Carl F. Endorf","doi":"10.1201/9781439833032.ch12","DOIUrl":null,"url":null,"abstract":"Carl F. Endorf 12.1 Understanding ROI 133 12.2 Asset Identification and Valuation 134 12.3 Threat and Vulnerability Exposure Factor 134 12.4 Determine the Single Loss Expectancy 135 12.5 Annualized Rate of Occurrence 135 12.6 Annual Loss Expectancy 135 12.7 Survey Controls 135 12.8 Calculate Your ROSI 135 ROSI Example † Arguments against ROSI","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Measuring ROI on Security\",\"authors\":\"Carl F. Endorf\",\"doi\":\"10.1201/9781439833032.ch12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Carl F. Endorf 12.1 Understanding ROI 133 12.2 Asset Identification and Valuation 134 12.3 Threat and Vulnerability Exposure Factor 134 12.4 Determine the Single Loss Expectancy 135 12.5 Annualized Rate of Occurrence 135 12.6 Annual Loss Expectancy 135 12.7 Survey Controls 135 12.8 Calculate Your ROSI 135 ROSI Example † Arguments against ROSI\",\"PeriodicalId\":407371,\"journal\":{\"name\":\"Information Security Management Handbook, 6th ed.\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Management Handbook, 6th ed.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781439833032.ch12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Management Handbook, 6th ed.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781439833032.ch12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
摘要
Carl F. Endorf 12.1了解ROI 133 12.2资产识别和估值134 12.3威胁和漏洞暴露系数134 12.4确定单次预期损失135 12.5年化发生率135 12.6年预期损失135 12.7调查控制135 12.8计算您的ROSI 135 ROSI示例†反对ROSI的争论
Carl F. Endorf 12.1 Understanding ROI 133 12.2 Asset Identification and Valuation 134 12.3 Threat and Vulnerability Exposure Factor 134 12.4 Determine the Single Loss Expectancy 135 12.5 Annualized Rate of Occurrence 135 12.6 Annual Loss Expectancy 135 12.7 Survey Controls 135 12.8 Calculate Your ROSI 135 ROSI Example † Arguments against ROSI