Security Metrics and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $64.99
  • Save: $43.07 (66%)
Rented from Amazon Warehouse Deals
To Rent, select Shipping State from options above
Due Date: Dec 18, 2015
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
+ $3.99 shipping
Used: Good | Details
Condition: Used: Good
Comment: Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc... All Day Low Prices!
Access codes and supplements are not guaranteed with used items.
  • List Price: $64.99
  • Save: $28.46 (44%)
In Stock.
Ships from and sold by
Gift-wrap available.
Security Metrics: Replaci... has been added to your Cart
Sell yours for a Gift Card
We'll buy it for $11.81
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Security Metrics: Replacing Fear, Uncertainty, and Doubt Paperback – April 5, 2007

26 customer reviews
ISBN-13: 978-0321349989 ISBN-10: 0321349989 Edition: 1st

Buy New
Price: $36.53
Price: $21.92
21 New from $34.88 15 Used from $20.00
Amazon Price New from Used from
"Please retry"
"Please retry"
$34.88 $20.00
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

Hero Quick Promo
Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now
$36.53 FREE Shipping. In Stock. Ships from and sold by Gift-wrap available.

Frequently Bought Together

Security Metrics: Replacing Fear, Uncertainty, and Doubt + IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data + Security Metrics, A Beginner's Guide
Price for all three: $94.72

Buy the selected items together

Editorial Reviews

From the Back Cover

<>The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations


Security Metricsis the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.


Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management.


Security Metricssuccessfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to:


• Replace nonstop crisis response with a systematic approach to security improvement

• Understand the differences between “good and “bad metrics

• Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk

• Quantify the effectiveness of security acquisition, implementation, and other program activities

• Organize, aggregate, and analyze your data to bring out key insights

• Use visualization to understand and communicate security issues more clearly

• Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources

• Implement balanced scorecards that present compact, holistic views of organizational security effectiveness


Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metricsis the resource you have been searching for.


Andrew Jaquith,program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured inCIO,CSO,InformationWeek,IEEE Security and Privacy, andThe Economist.





About the Author           

Chapter 1          Introduction: Escaping the Hamster Wheel of Pain          

Chapter 2          Defining Security Metrics           

Chapter 3          Diagnosing Problems and Measuring Technical Security  

Chapter 4          Measuring Program Effectiveness           

Chapter 5          Analysis Techniques     

Chapter 6          Visualization     

Chapter 7          Automating Metrics Calculations

Chapter 8          Designing Security Scorecards  




About the Author

Andrew Jaquith is the program manager for Yankee Group’s Enabling Technologies Enterprise group, with expertise in compliance, security, and risk management. Jaquith advises enterprise clients on how to manage security resources in their environments. He also helps security vendors develop strategies for reaching enterprise customers. Jaquith’s research focuses on topics such as security management, risk management, and packaged and custom web-based applications.


Jaquith has 15 years of IT experience. Before joining Yankee Group, he cofounded and served as program director at @stake, Inc., a security consulting pioneer, which Symantec Corporation acquired in 2004. Before @stake, Jaquith held project manager and business analyst positions at Cambridge Technology Partners and FedEx Corporation.


His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. In addition, Jaquith contributes to several security-related open-source projects.


Jaquith holds a B.A. degree in economics and political science from Yale University.



Shop the new
New! Introducing the, a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 336 pages
  • Publisher: Addison-Wesley Professional; 1 edition (April 5, 2007)
  • Language: English
  • ISBN-10: 0321349989
  • ISBN-13: 978-0321349989
  • Product Dimensions: 7 x 0.7 x 9.2 inches
  • Shipping Weight: 1 pounds (View shipping rates and policies)
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (26 customer reviews)
  • Amazon Best Sellers Rank: #202,127 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

40 of 41 people found the following review helpful By Richard Bejtlich on August 9, 2007
Format: Paperback
I read Security Metrics right after finishing Managing Cybersecurity Resources, a book by economists arguing that security decisions should be made using cost-benefit analysis. On the face of it, cost-benefit analysis makes perfect sense, especially given the authors' analysis. However, Security Metrics author Andy Jaquith quickly demolishes that approach (confirming the problem I had with the MCR plan). While attacking the implementation (but not the idea) of Annual Loss Expectancy for security events, Jaquith writes on p 33 "[P]ractitioners of ALE suffer from a near-complete inability to reliably estimate probabilities [of occurrence] or losses." Bingo, game over for ALE and cost-benefit analysis. It turns out the reason security managers "herd" (as mentioned in MCR) is that they have no clue what else to do; they seek safety in numbers by emulating peers and then claim that as a defense when they are breached.

Fortunately, Security Metrics offers another solution. The book gives readers three sets of information: theory, metrics, and tools (concepts, not programs). The theory chapters (1 and 2) were so concise yet insightful I was tempted to underline every sentence. (I am not kidding.) Even the Preface made me glad to be reading the book when it associated "security ROI" with "the Macarena" and called it a "needless distraction." I laughed in agreement when I saw Andy call "security enablement" the "Abominable Snowman: it is rarely spotted, but legions of people swear it exists. After all, as my friend Dan geer puts it, 'You don't usually see airlines advertising how their planes fall out of the sky less often than their competitors.'" Why is that? My answer is simple: security is assumed and expected. Advertising anything else has no effect or makes people suspicious.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
19 of 20 people found the following review helpful By Wendy Nather on April 21, 2007
Format: Paperback
It's difficult to imbue a book on metrics with something other than academic theories, but Jaquith offers the working security professional a tangible lifeline. Nearly all of his suggested metrics are within easy reach, thanks to a commonsense approach and a tie-in to the instrumentation you're most likely to have in your data center.

Don't be scared off by the term "metrics," either; it's an easy read, chock full of amusing stories and turns of phrase (I thought my 80-year-old father was the only one who said "'pert near"). Jaquith focuses on the practical, from What Not to Draw (a graphics primer for charts and tables) to a Balanced Scorecard Makeover that actually looks achievable from outside the C-suite.

If your boss likes metrics, and your budget request is in jeopardy, you can't do better than this guide to making your case. Now, if only we had a practical, lightweight risk analysis methodology to go along with it ...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
20 of 22 people found the following review helpful By Ben Rothke on May 16, 2007
Format: Paperback
The goal of security metrics is to replace fear, uncertainty, and doubt (FUD) with a more formalized and meaningful system of measurement. The FUD factor is the very foundation upon which much of information security is built, and the outcome is decades of meaningless statistics and racks of snake oil products. Let's hope that Andrew Jaquith succeeds, but in doing so, he is getting in the way of many security hardware and software vendors whose revenue streams are built on FUD.

One could write a book on how FUD sells security products. One of the most memorable incidents was in 1992 when John McAfee created widespread panic about the impending Michelangelo virus. The media was all over him as he was selling solutions for the five million PCs worldwide he said would be affected. The end result is that the Michelangelo virus was a non-event. Nonetheless, it was far from the last time that FUD was used to sell security.

The allure of FUD is that companies can spend huge amounts of money fighting nebulous digital adversaries and feel good about it. They can then put all of that fancy hardware in dedicated racks in their data center, impressing the auditors with the flashing lights giving off an aroma of security and compliance.

And that is the chaos that security metrics comes to solve. Security metrics, if done right, can help transform a company from a nebulous perspective on security to an effective one based on formal security risk metrics.

Security Metrics is a fabulous book that should be in the hands of every security professional.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
10 of 10 people found the following review helpful By Russell C. Thomas on May 21, 2007
Format: Paperback
I'd really like to give this "3 ½" stars, but I rounded up to 4 stars. There is, currently, no book that is the "last word" on security metrics. The field is just not mature enough for that. However, this is certainly a very good and useful book for most people.

This book is for you if you are a practicing information security professional and you want to know the latest ideas about how to define, deploy, and use security metrics to improve security management. Written in an informal, personal style, Andrew's book reads like "letters from the front lines" (by analogy) than a treatise on military strategy.
The informal style makes the reading, at times, both fun and funny.

He's up front about his preferences and biases, so you know where he's coming from. But he's not bombastic. If you disagree with him on some points (as I do), so be it. His writing invites open debate on the important issues. He's also generous in quoting and crediting various members of the security metrics communities that he participates in.

Andrew falls into the "bag-o-metrics" school of thought, as contrasted from the "risk modeling" school. (This is currently a raging debate within the community.) Basically, Andrew is pessimistic about the possibility of defining any models that integrate security metrics into an overall assessment of business risk. He's especially caustic in his comments about "asset valuation" and other related approaches. Given their current state of development, I don't blame him.

Given this philosophy, Andrew proposes a long list of operational security metrics, each of which measure something very specific (and quantitative), but don't necessarily aggregate. With enough of these "point metrics", some correlations may emerge, he reasons.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Security Metrics: Replacing Fear, Uncertainty, and Doubt
This item: Security Metrics: Replacing Fear, Uncertainty, and Doubt
Price: $36.53
Ships from and sold by

Want to discover more products? Check out this page to see more: usenix security