How can security be measured?
One way to measure IT security is to tabulate reports of cyberattacks and cyber threats over time. By mapping these threats and responses chronologically, companies can get closer to evaluating how well security systems have worked as they are implemented. Companies can also survey point people who are in key security positions to provide for a kind of "risk perception" that will also feed into security benchmarking. Some experts recommend tracking security return on investment by asking the right questions of those who work on the front lines of cyber security and taking all of the incoming data to provide a bigger picture for security results.
Companies can also promote accuracy and security measurement by breaking security down into its various components. For example, endpoint security is the specific implementation of security practices for data endpoints like smartphone screens, tablets and PCs. Other aspects of data security involve data in use over a network, where professionals may use network checkpoints to establish security benchmarks, or measure security in other ways.
For many IT professionals, security measurement is an "input in, input out" process where security experts aggregate data about cyber threats, feeding it into a database and coming up with informative reports. These types of sophisticated analysis help to drive the evaluation of security practices and help human decision-makers deal with change management for security strategies. In general, IT security involves a "security life cycle" with multiple steps and stages to respond to threats, rather than just providing a static type of protection.
At Techopedia, we aim to provide insight and inspiration to IT professionals, technology decision-makers and anyone else who is proud to be called a geek. From defining complex tech jargon in our dictionary, to exploring the latest trend in our articles or providing in-depth coverage of a topic in our tutorials, our goal is to help you better understand technology - and, we hope, make better decisions as a result.Full Bio
More From Our Experts
Free Whitepaper: The Path to Hybrid Cloud:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic:
- Oct25 A Bigger Magnifying Glass: Analyzing the Internet of Things
- Oct26 The Central Hub: Defining the Data Lake
- Oct27 The New Normal: Dealing with the Reality of an Unsecure World
- Nov01 Time's Up! Getting Value from Big Data Now
- Nov16 Data Modeling in an Agile Environment
E-mail is not a threat. (Postal mail) is universal. The Internet is not.- USPS spokesperson Susan Brennan, in a 2001 Wired article.