670 likes | 918 Views
Objectives. Upon completion of this chapter you should be able to:List the elements of key information security management practicesDescribe the key components of a security metrics program Identify suitable strategies for the implementation of a security metric programDiscuss emerging trends in
E N D