Cider - Shop now
Buy new:
-13% $60.73
FREE delivery Wednesday, May 14 to Nashville 37217
Ships from: Amazon.com
Sold by: Amazon.com
$60.73 with 13 percent savings
List Price: $69.99
FREE Returns
FREE delivery Wednesday, May 14 to Nashville 37217
Or Prime members get FREE delivery Monday, May 12.
In Stock
$$60.73 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$60.73
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$24.91
Get Fast, Free Shipping with Amazon Prime FREE Returns
Shows signs of wear. Jacket may be torn cover may have creases pages have some writing and highlighting. May have some water damage. May be a former library book. Ships direct from Amazon! Shows signs of wear. Jacket may be torn cover may have creases pages have some writing and highlighting. May have some water damage. May be a former library book. Ships direct from Amazon! See less
FREE delivery Thursday, May 15 to Nashville 37217 on orders shipped by Amazon over $35. Order within 2 hrs 20 mins
Only 1 left in stock - order soon.
$$60.73 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$60.73
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Security Metrics: Replacing Fear, Uncertainty, and Doubt 1st Edition

4.4 out of 5 stars 59 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$60.73","priceAmount":60.73,"currencySymbol":"$","integerValue":"60","decimalSeparator":".","fractionalValue":"73","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"n0Nu6dek8a6ZtqC2JEEoqN6P5MbukuSW4AjoWAf8F1uavshIRXm9kz5jqrkkMd%2BikQoOQqFAlK9GFePJlj4EM0bd2hasLwuZxJdGZrofMKemGwUivA%2FgcTKEZyqBWax5Q0YrWLuIkgA%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$24.91","priceAmount":24.91,"currencySymbol":"$","integerValue":"24","decimalSeparator":".","fractionalValue":"91","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"n0Nu6dek8a6ZtqC2JEEoqN6P5MbukuSW8WiCBazY2KttaH0Y4jpvd%2BfNozO0KS1u8QQH%2BSkh5XzRyrcOs3JbZbPuRqmcyu%2BXmYOrBBCOY%2F3G5RP3nNvkjOgtiXDC1aCU731cc5qjO0R8u28o6hrqWUqDGqKTFYnj1V%2FDY%2BRWAFvGEIEh%2Bo423Q%3D%3D","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

<> The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.

Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.

Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to:

• Replace nonstop crisis response with a systematic approach to security improvement

• Understand the differences between “good” and “bad” metrics

• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk

• Quantify the effectiveness of security acquisition, implementation, and other program activities

• Organize, aggregate, and analyze your data to bring out key insights

• Use visualization to understand and communicate security issues more clearly

• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources

• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

Whether you’re an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making–Security Metrics is the resource you have been searching for.

Andrew Jaquith, program manager for Yankee Group’s Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist.

Foreword

Preface

Acknowledgments

About the Author

Chapter 1 Introduction: Escaping the Hamster Wheel of Pain

Chapter 2 Defining Security Metrics

Chapter 3 Diagnosing Problems and Measuring Technical Security

Chapter 4 Measuring Program Effectiveness

Chapter 5 Analysis Techniques

Chapter 6 Visualization

Chapter 7 Automating Metrics Calculations

Chapter 8 Designing Security Scorecards

Index

Frequently bought together

This item: Security Metrics: Replacing Fear, Uncertainty, and Doubt
$55.29
In Stock
Ships from and sold by betterdeals2019.
+
$27.95
Get it as soon as Wednesday, May 14
In Stock
Ships from and sold by Amazon.com.
+
$38.08
Get it as soon as Wednesday, May 14
In Stock
Ships from and sold by Amazon.com.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
These items are shipped from and sold by different sellers.
Choose items to buy together.

Editorial Reviews

From the Back Cover

<> The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.

Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.

Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to:

• Replace nonstop crisis response with a systematic approach to security improvement

• Understand the differences between “good” and “bad” metrics

• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk

• Quantify the effectiveness of security acquisition, implementation, and other program activities

• Organize, aggregate, and analyze your data to bring out key insights

• Use visualization to understand and communicate security issues more clearly

• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources

• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

Whether you're an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making–Security Metrics is the resource you have been searching for.

Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist.

Foreword

Preface

Acknowledgments

About the Author

Chapter 1 Introduction: Escaping the Hamster Wheel of Pain

Chapter 2 Defining Security Metrics

Chapter 3 Diagnosing Problems and Measuring Technical Security

Chapter 4 Measuring Program Effectiveness

Chapter 5 Analysis Techniques

Chapter 6 Visualization&n

About the Author

Andrew Jaquith is the program manager for Yankee Group’s Enabling Technologies Enterprise group, with expertise in compliance, security, and risk management. Jaquith advises enterprise clients on how to manage security resources in their environments. He also helps security vendors develop strategies for reaching enterprise customers. Jaquith’s research focuses on topics such as security management, risk management, and packaged and custom web-based applications.

Jaquith has 15 years of IT experience. Before joining Yankee Group, he cofounded and served as program director at @stake, Inc., a security consulting pioneer, which Symantec Corporation acquired in 2004. Before @stake, Jaquith held project manager and business analyst positions at Cambridge Technology Partners and FedEx Corporation.

His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. In addition, Jaquith contributes to several security-related open-source projects.

Jaquith holds a B.A. degree in economics and political science from Yale University.

Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional; 1st edition (March 26, 2007)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 336 pages
  • ISBN-10 ‏ : ‎ 0321349989
  • ISBN-13 ‏ : ‎ 978-0321349989
  • Item Weight ‏ : ‎ 1.04 pounds
  • Dimensions ‏ : ‎ 7 x 0.95 x 9.15 inches
  • Customer Reviews:
    4.4 out of 5 stars 59 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Andrew Jaquith
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read book recommendations and more.

Customer reviews

4.4 out of 5 stars
59 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers consider this book a must-read for information security managers and highly recommend it for security and risk managers. The book receives positive feedback for its readability.

AI-generated from the text of customer reviews

10 customers mention "Information security"10 positive0 negative

Customers consider this book essential reading for information security managers, with one customer noting it offers best practices for presenting metrics.

"...Security Metrics offers valuable insight to organizations seeking to provide a greater level of intelligence and meaning around their security..." Read more

"...Author is a consultant and offers best practices on how to present metrics (aesthetics), and advises you on what tangible metrics will give you the..." Read more

"...Jaquith describes why capturing and analyzing security metrics is a good and powerful thing and how you can use that intelligence to better..." Read more

"A must read if you manage information security at your organization, Jaquith is an insightful manager and excellent writer sharing his thoughts and..." Read more

3 customers mention "Readability"3 positive0 negative

Customers find the book readable.

"...the choice to give a 5 star rating was based on its organization, readability, entertaining quips, and the fact that many of the alternative..." Read more

"...at your organization, Jaquith is an insightful manager and excellent writer sharing his thoughts and examples." Read more

"...Written in an easy to read format and loaded with valuable experience and solutions...." Read more

Top reviews from the United States

  • Reviewed in the United States on December 2, 2007
    Upon completion of this book, I began to muse: what percentage of security professionals have given any thought to security metrics? For those that have actually considered the topic, with what level of frequency do they entertain thoughts of security metrics? Yearly? Monthly? Daily? Gee, I think to myself, I'd like to see a time series analysis exhibit of that...

    Based on the fact that I sit here torturing myself with these thoughts, I contend that Security Metrics has already influenced my approach toward security management. Indeed, Jaquith has done an excellent job of exposing an area that is critical to effective security management, but to which many security practitioners (myself included) have previously paid lip service. Security Metrics offers valuable insight to organizations seeking to provide a greater level of intelligence and meaning around their security program(s).

    In addition to how well the ideas of the book resonated with my own professional and academic background, the choice to give a 5 star rating was based on its organization, readability, entertaining quips, and the fact that many of the alternative publications in the realm of security metrics are triple or more the cost of this one. Though I've not yet read or reviewed other similar works, the bar has been set high.
    2 people found this helpful
    Report
  • Reviewed in the United States on February 11, 2009
    SECURITY METRICS is one of the only books you can find dealing with Info System Security (ISS) metrics. Author is a consultant and offers best practices on how to present metrics (aesthetics), and advises you on what tangible metrics will give you the most bang for the buck. Later in the book, Jaquith takes you up to the next level by adapting the Balanced Scorecard to the ISS world. Again, author walks you through specifics on metrics that would be reflective of the four different perspectives [Financial, Customer, Internal, and Learning&Growth]...a big help for anyone who has wrestled with Kaplan & Norton's "Balanced Scorecard" book.
  • Reviewed in the United States on December 16, 2013
    See the Full Review at my blog site: Terebrate.

    This book is a must-read for all cyber security professionals. It is not a part of the canon because it attacks a sacred cow of the industry—Annualized Loss Expectancy (ALE) as a means to justify your security budget—and the community has yet to fully embrace the idea that ALE might not be a good idea in all cases. But you should seriously consider this notion and this book is your gateway to do so. Consider it a Canon-Candidate. Jaquith describes why capturing and analyzing security metrics is a good and powerful thing and how you can use that intelligence to better understand the porous nature of your networks. It will help you unshackle yourself from the chains of probabilistic risk assessments. It will turn you away from the dark side and toward a more meaningful process to assess your enterprise’s security. You should have read this by now.
    One person found this helpful
    Report
  • Reviewed in the United States on May 25, 2013
    A must read if you manage information security at your organization, Jaquith is an insightful manager and excellent writer sharing his thoughts and examples.
  • Reviewed in the United States on June 1, 2015
    From the examples, you can tell this book is a bit dated. Other than that, it is still very crisp and fresh. The message that it advocates is, in my experience, still very welcome in this field (and beyond). Recommended!
    2 people found this helpful
    Report
  • Reviewed in the United States on July 2, 2018
    Interesting and useful info.
  • Reviewed in the United States on September 19, 2007
    What a book. Seriously, I laughed, I cried. I shouted in frustration, only to be placated on the next page. I got a better understanding of what Andy has been banging on about with Security Metrics. And it helps me do my job better.
    One person found this helpful
    Report
  • Reviewed in the United States on May 16, 2007
    The goal of security metrics is to replace fear, uncertainty, and doubt (FUD) with a more formalized and meaningful system of measurement. The FUD factor is the very foundation upon which much of information security is built, and the outcome is decades of meaningless statistics and racks of snake oil products. Let's hope that Andrew Jaquith succeeds, but in doing so, he is getting in the way of many security hardware and software vendors whose revenue streams are built on FUD.

    One could write a book on how FUD sells security products. One of the most memorable incidents was in 1992 when John McAfee created widespread panic about the impending Michelangelo virus. The media was all over him as he was selling solutions for the five million PCs worldwide he said would be affected. The end result is that the Michelangelo virus was a non-event. Nonetheless, it was far from the last time that FUD was used to sell security.

    The allure of FUD is that companies can spend huge amounts of money fighting nebulous digital adversaries and feel good about it. They can then put all of that fancy hardware in dedicated racks in their data center, impressing the auditors with the flashing lights giving off an aroma of security and compliance.

    And that is the chaos that security metrics comes to solve. Security metrics, if done right, can help transform a company from a nebulous perspective on security to an effective one based on formal security risk metrics.

    Security Metrics is a fabulous book that should be in the hands of every security professional. The book demonstrates that companies must establish metrics based on their unique requirements, as opposed to simply basing their requirements on imprecise industry polls, best-practices and other ill-defined methods.

    So why don't companies do that in the first place? If security metrics can provide even a quarter of the benefits that Jaquith states, companies should run to implement them. Real security metrics require an organization to open up their security hood and dig deep into the engine that runs their security infrastructure. It necessitates understanding the internal requirements, unique organizational risks, myriad strengths and weaknesses, and much more. Very few companies are willing to dedicate the time and resources for that, and would rather build their security infrastructure on thick layers of FUD. History has shown that the security appliance of the month almost always beats a formal risk and needs assessment.

    Chapter 1 lays out the problem with approaches that most companies take to risk management. The main problem is that traditional risk management is far too dependant on identification and fixing, as opposed to quantification and triage based on value. Quantifying and valuing risk is much more difficult than simply identifying, since the software tools used do not have an organization context or knowledge of the specific business domain.

    Chapter 2 sets out the foundation of security metrics. The goal of these metrics are to provide a framework in which organizations can quantify the likelihood of danger, estimate the extent of possible damage, understand the performance of their security organizations and weigh the costs of security safeguards against their expected effectiveness.

    The time has come for security metrics since information security is one of the few management disciplines that have yet to submit itself to serious analytical scrutiny. The various chapters provide many different metrics that can be immediately used in most organizations to address that.

    The author defines various criteria for what makes a good metric. One of his pet peeves is the use of the traffic light as a metaphor for compliance. Jaquith feels that traffic lights are not metrics at all, since they don't contain a unit of measure or are a numerical scale. He suggests using traffic lights colors sparingly, and only to supplement numerical data or draw attention to outliers. He astutely notes that if your data contains more precision than three simple gradations, why dilute their value by obscuring them with a traffic light.

    The chapter concludes on what makes a bad metric, defined as any metric that relies too much on the judgment of a person. These metrics can't be relied on since the results can't be guaranteed to be the same from person to person. Also, security frameworks such as ISO-17799 should not be used for metrics. The book also tackles the sacred cow of risk management, namely ALE (annualized loss expectancy), and how it is significantly misused and misunderstood in the industry.

    The book states that in developing metrics, there must be formal collaboration between the business units and the security staff. This collaboration serves to increase awareness and acceptance of security. In addition, it ensures that security requirements are incorporated into the lifecycle early on. This is needed as business units generally have no clue as to what the needed security requirements are.

    Chapter 5 is a short course on analysis techniques and statistics. The author quotes George Colony who stated that "any idiot can tell you what something is. It is much harder to say what that thing means". With that, the book details a number of techniques for analyzing security data (average, median, time series, etc.) and how each one should be used.

    Chapter 6 is about visualization and notes that most information security professionals have no real idea how to show security, both literally and figuratively. Part of the problem is that security is proliferated with esoteric terminology and concepts, and the lack of understanding risk management amongst the masses. Part of the reason for this difficulty in sharing the security message with management is that many security practitioners lack simple metaphors for communicating priorities. This is compounded by the fact that the message is often focused exclusively on technical security issues, as opposed to the underlying business issues, which is was management is concerned with. The chapter is invaluable as it weans one off the malevolent pie chart and traffic light PowerPoint presentation.

    Marcus Ranum notes that people seem to want to treat computer security like its rocket science or black magic. In fact, computer security is nothing but attention to detail and good design. FUD is all about emphasizing the black magic aspect of hackers and other rogue threats. Metrics are all about the attention to detail that FUD lives to obfuscate.

    Security Metrics: Replacing Fear, Uncertainty, and Doubt is one of the more important security books of the last few years. Jaquith turns much of the common security wisdom on its head, and the world will be a better place for it. Security metrics are a necessity whose time has come and this invaluable book shows how it can be done.
    20 people found this helpful
    Report

Top reviews from other countries

  • User
    1.0 out of 5 stars Worst paper quality compared to price ( 3K+ INR )
    Reviewed in India on April 6, 2016
    Paper quality worst and cheap. not at all worth of INR 3k+. This type of cheap product was not expected from Amazon.