Security Metrics

Nonfiction, Computers, Internet, Security, Networking & Communications
Cover of the book Security Metrics by Andrew Jaquith, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Andrew Jaquith ISBN: 9780132715775
Publisher: Pearson Education Publication: March 26, 2007
Imprint: Addison-Wesley Professional Language: English
Author: Andrew Jaquith
ISBN: 9780132715775
Publisher: Pearson Education
Publication: March 26, 2007
Imprint: Addison-Wesley Professional
Language: English
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

 

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.

 

Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.

 

Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to:

 

• Replace nonstop crisis response with a systematic approach to security improvement

• Understand the differences between “good” and “bad” metrics

• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk

• Quantify the effectiveness of security acquisition, implementation, and other program activities

• Organize, aggregate, and analyze your data to bring out key insights

• Use visualization to understand and communicate security issues more clearly

• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources

• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

 

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

 

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.

 

Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.

 

Security Metrics successfully bridges management’s quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith’s extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You’ll learn how to:

 

• Replace nonstop crisis response with a systematic approach to security improvement

• Understand the differences between “good” and “bad” metrics

• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk

• Quantify the effectiveness of security acquisition, implementation, and other program activities

• Organize, aggregate, and analyze your data to bring out key insights

• Use visualization to understand and communicate security issues more clearly

• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources

• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness

 

 

More books from Pearson Education

Cover of the book Computer Forensics by Andrew Jaquith
Cover of the book How to Write Articles and Get them Published by Andrew Jaquith
Cover of the book What to Eat When You're Pregnant including the A-Z of what's safe and what's not by Andrew Jaquith
Cover of the book A Developer's Guide to Amazon SimpleDB by Andrew Jaquith
Cover of the book Exam Ref 70-519 Designing and Developing Web Applications Using Microsoft .NET Framework 4 (MCPD) by Andrew Jaquith
Cover of the book Law Express Question and Answer: Medical Law by Andrew Jaquith
Cover of the book Analysis Without Paralysis by Andrew Jaquith
Cover of the book Principles of Power Integrity for PDN Design--Simplified by Andrew Jaquith
Cover of the book Hacking the Digital Print by Andrew Jaquith
Cover of the book Inside track, Succeeding in Exams and Assessments by Andrew Jaquith
Cover of the book Adobe Premiere Pro CC Classroom in a Book by Andrew Jaquith
Cover of the book Business Express: Managing performance and appraisals by Andrew Jaquith
Cover of the book Adobe InDesign CS6 on Demand by Andrew Jaquith
Cover of the book Brilliant Presentation 3e by Andrew Jaquith
Cover of the book Real-World Data Mining by Andrew Jaquith
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy