Table A19. <D-2-2> Intrusion incident response time metric.

Item Description
Evaluation item Information security(D) >> Response level (capability) of infringement incident(D.2)
Metric <D-2-2> Intrusion incident response time
Explanation The response completion time following the response procedure after the occurrence of the infringement incident (the situation ending time)
Measurement method X = Average processing time till the situation ending after detecting the infringement incident
Y = X T arg e t V a l u e T arg e t V a l u e × 100 (excess ratio of processing time)
Data gathering method (Data sources) ■ System ■ Data
□ Questionnaires □ Interview
※ Measure the occurrence of infringement incident from target IS and the processing time from related reports