Page 1113 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1113

Number of compromised accounts

                    Number of software flaws detected in preproduction scanning


                    Repeat audit findings
                    User attempts to visit known malicious sites


               Once an organization identifies the key security metrics it wishes to
               track, managers may want to develop a dashboard that clearly displays
               the values of these metrics over time and display it where both
               managers and the security team will regularly see it.
   1108   1109   1110   1111   1112   1113   1114   1115   1116   1117   1118