Sunteți pe pagina 1din 1

Metrics to Track Cybersecurity Efforts Cheat Sheet

by David Pollack (Davidpol) via cheatography.com/2754/cs/8491/

Introd​uction Potential Metrics

The steps taken by the federal government are just starting points, and In the presen​tation, Richmann identified 19 potential metrics for agencies
much work is yet to be done to improve the security of IT systems, data to use, but cautioned that agencies must
and critical infras​tru​cture. Jim Richmann, Study Director of Cybers​ecurity tailor their metrics to meet their needs. The examples he presented were:
Research, Institute of Defense Analyses, recently spoke during a 1. Percentage of source traffic covered by founda​tional cyber defense
GovLoop webinar, Combating the Cyber Landscape. Richmann’s assets in DMZs
presen​tation focused on how agencies can establish cyber metrics to 2. Currency of enterprise virus signatures
improve security strategies. Prior to identi​fying potential metrics for 3. Percentage of client systems that have current enterprise virus
agencies to adopt, Richmann provided an overview of the founda​tional signatures
elements needed to create metrics at an agency. Four areas he focused 4. Percentage of desktops with automated patching
on were:. 5. Percentage of desktops with automated integrity checking
6. Volume of traffic blocked at border router (segmented by type)
Founda​tional Elements Needed to Create Metrics 7. Blocked port scan volume at border router
8. Currency of firmware patches for founda​tional cyber defense assets
 Understand Your Cybers​ecurity Founda​tion: This foundation 9. Known zero day export exposure (publicly known)
includes hardware and software assets, including, routers, switches, 10. Uptime and availa​bility for assets
physical point-​to-​point circuits, SANs, management tools, satellite links 11. Number of cyber attacks that are detected: Viruses, spam, phishing
and wireless hubs. attacks, etc.
 Know Your Dedicated Defense Assets: These assets are designed 12. Assets not patched to current standard
only to provide cyber defense. These elements include enterprise virus 13. Firmware not updated to enterprise standards
scanning software, intrusion detection systems, firewalls and PKI. 14. Assets failing integrity check
 Identify Your Unique Cyberspace Assets: 15. Non-st​andard software instal​lations detected
These assets exist only in cybers​pace. Some examples include end-user 16. Known zero-day exploit exposure (publicly known)
hardware clients, applic​ation servers, web servers, mobile devices, web 17. Currency of required admini​strator training
servers, ERP systems, printers, scanners and applic​ation software. 18. Vulner​ability scan statistics
 Assets that Leverage Cybers​pace: These assets utilize cybers​pace, 19. Source code scan results (where available and applic​able)
but their primary existence and function is in other domains. Some
Cybers​ecurity is only effective when agencies can baseline and measure
examples include weapons systems, related platforms, support systems
success. In order to do so, agencies must place an emphasis on defining
and infras​tru​cture.
metrics that fit organi​zat​ional need, and work diligently to identify risks,
assess vulner​abi​lities and create a robust set of metrics to measure
success.

By David Pollack (Davidpol) Published 10th October, 2016. Sponsored by CrosswordCheats.com


cheatography.com/davidpol/ Last updated 10th October, 2016. Learn to solve cryptic crosswords!
Page 1 of 1. http://crosswordcheats.com

S-ar putea să vă placă și