Page 48 - index
P. 48







In conclusions, the task of developing a security metrics program may seem daunting to some,
but it need not be. The presented methodology can guide development of very simple metrics
programs, as well as highly ambitious ones. In fact, the majority of cyber experts recommend
organizations to make a simple start in case of security metrics. They advise managers to do
what is easy, cheap, fast, and leverage existing measures and metrics. What everyone should
keep in mind is that the purpose of metrics is to make improvements in a security metrics
program and to assist in proving the value of that program to the organization as a whole. If a
metrics program can do these, then we can say it’s successful and purposeful.




About The Author

Since Milica Djekic graduated in Control Engineering at Univestity of
Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Currently, she’s
the Editor-in-Chief of Australian Science Magazine, as well as an
Online Marketing Coordinator for Dejan SEO. Milica is based in
Subotica, Serbia.


















































I25B /1B>9>7C &171J9>5 M +5@D5=25B 49D9?>
?@IB978D K I25B 565>C5 &171J9>5 << B978DC B5C5BF54 G?B<4G945
   43   44   45   46   47   48   49   50   51   52   53