Abstract
The purpose of this appendix is to bring together a previously introduced hierarchy of cybersecurity assessment concepts into three worked-out numerical examples. These worked-out examples show how an enterprise can obtain an answer to the following fundamental enterprise cybersecurity questions:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam
About this chapter
Cite this chapter
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A. (2015). Cybersecurity Sample Assessment. In: Enterprise Cybersecurity. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6083-7_23
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6083-7_23
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6082-0
Online ISBN: 978-1-4302-6083-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)