Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith
- 出版商: Addison Wesley
- 出版日期: 2007-03-01
- 售價: $2,500
- 貴賓價: 9.5 折 $2,375
- 語言: 英文
- 頁數: 336
- 裝訂: Paperback
- ISBN: 0321349989
- ISBN-13: 9780321349989
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$1,690$1,606 -
$650$514 -
$750$593 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$550$468 -
$450$383 -
$1,200$948 -
$620$490 -
$990$891 -
$290$226 -
$980$774 -
$490$387 -
$620$490 -
$1,584Applied Security Visualization (Paperback)
-
$1,480$1,406 -
$780$515 -
$590$460 -
$880$695 -
$690$587 -
$650$514 -
$180$142 -
$580$383 -
$1,088Search Patterns: Design for Discovery (Paperback)
-
$490$387 -
$490$382
相關主題
商品描述
Description
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.
Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to:
• Replace nonstop crisis response with a systematic approach to security improvement
• Understand the differences between “good” and “bad” metrics
• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk
• Quantify the effectiveness of security acquisition, implementation, and other program activities
• Organize, aggregate, and analyze your data to bring out key insights
• Use visualization to understand and communicate security issues more clearly
• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources
• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness
Whether you’re an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making–Security Metrics is the resource you have been searching for.
Table of Contents
Foreword xv
Preface xix
Acknowledgments xxv
About the Author xxviii
Chapter 1 Introduction: Escaping the Hamster Wheel of Pain 1
Chapter 2 Defining Security Metrics 9
Chapter 3 Diagnosing Problems and Measuring Technical Security 39
Chapter 4 Measuring Program Effectiveness 89
Chapter 5 Analysis Techniques 133
Chapter 6 Visualization 157
Chapter 7 Automating Metrics Calculations 217
Chapter 8 Designing Security Scorecards 251
Index 301