- Hardcover: 512 pages
- Publisher: Auerbach Publications; 1 edition (January 8, 2013)
- Language: English
- ISBN-10: 1439881529
- ISBN-13: 978-1439881521
- Product Dimensions: 6.1 x 1.1 x 9.2 inches
- Shipping Weight: 1.9 pounds (View shipping rates and policies)
- Average Customer Review: 10 customer reviews
- Amazon Best Sellers Rank: #927,073 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
PRAGMATIC Security Metrics: Applying Metametrics to Information Security 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
Like all books on metrics, PRAGMATIC Security Metrics: Applying Metametrics to Information Security makes the statement that "you can't manage what you can't measure". The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is meant as a how-to-do-it guide for security metrics.
As to the title, PRAGMATIC is an acronym for the basis of the method of the book, in using metrics that are predictive, relevant, actionable, genuine, meaningful, timely, independent and cost. After reading the first chapter, PRAGMATIC Security Metrics: Applying Metametrics to Information Security looks like it may live up to its promise of being able to use metrics not only to track and report performance but to identify problem areas and opportunities, and drive information security improvements. If so, this could be the metrics book a lot of information security professionals have been waiting for.
―Ben Rothke, CISSP, CISM, Information Security Manager, Wyndham Worldwide; and author of Computer Security: 20 Things Every Employee Should Know, writing on the RSA Conference Blog, www.rsaconference.com
About the Author
Krag Brotby CISM CGEIT has 30 years' experience in enterprise computer security architecture, governance, risk, and metrics. He is the principal author/editor of ISACA's Certified Information Security Manager Review Manual, plus Information Security Governance: Guidance for Boards of Directors and Guidance for Information Security Managers; Information Security Management Metrics; and Information Security Governance: A Practical Development and Implementation Approach. Krag has served on ISACA committees and the California High Tech Task Force Steering Committee, and frequently presents conference workshops and seminars. Krag was the principal architect for Xerox BASIA enterprise security and the SWIFT Next Gen PKI; served as technical director at RAND Corporation and chief security strategist for TransactPlus. He developed policies for several U.S. banks and consulted for Australia Post, New Zealand Inland Revenue, Singapore Infocom Development Agency, Microsoft, Unisys, AT&T, BP Alyeska, Countrywide Financial, Informix, Visa, VeriSign, Digital Signature Trust, Zantaz, Bank Al-Bilad, J.P. Morgan Chase, KeyBank, Certicom, and Paycom, among others. Krag delivers courses in metrics, governance‐risk‐compliance (GRC) and risk, and holds a foundation patent for digital rights management.
Dr Gary Hinson PhD MBA CISSP has worked in IT system and network administration, information security and IT auditing with multinationals in the pharmaceuticals/life sciences, utilities, IT, engineering, defense, and financial services industries, since the 1980s, and consulting since 2000. His day job involves preparing security awareness materials for NoticeBored (NoticeBored.com), an innovative subscription service. He is also responsible for ISO27001security.com, the ISO27k Toolkit and Forum supporting a global user community. Gary was originally a scientist researching bacterial genetics. The rational scientist and metrician still lurks deep within.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
The authors claim that other books on information security metrics discuss number theory and statistics in academic terms. This title promises to be light on mathematics and heavy on utility and is meant as a how-to-do-it guide for security metrics.
Based on that claim, the authors likely had a book such as Data-Driven Security: Analysis, Visualization and Dashboards by Jay Jacobs and Bob Rudis in mind. As Jacobs and Rudis do indeed use statistics extensively in their approach to security metrics.
As to the title, PRAGMATIC is an acronym for the basis of the method of the book, in using metrics that are predictive, relevant, actionable, genuine, meaningful, timely, independent and cost.
One of the benefits of the book is that it provides a method to create quantitative methods for risk, and how to estimate which resources to use to mitigate those identified risks
The authors note that as a consequence of the way the field of information security has developed from IT security, current practice in security metrics seems to be driving by the availability of raw data from firewalls and other systems. But when it comes to measuring security, many organizations completely ignore the nontechnical factors that are often of equal importance to managing information security in a manner that supports the firm’s business objectives. And that is precisely the gap the book is attempting to fix.
Chapter 7 makes up the bulk of the book when it details over 150 different useful metrics in which to use.
For those looking for a book in which to develop their information security metrics program, in PRAGMATIC Security Metrics: Applying Metametrics to Information Security is a valuable reference.
As a CISO I am need of security metrics myself but was always a little bit hesitant of delving deeper into the matter as some of the books I read about the topic seemed arcane and rather impractical for daily use. And now this book comes along, making the whole matter in my opinion much clearer and easier to handle.
In the first few chapters Brotby and Hinson provide an overview of the status quo and the why and how of security metrics. They deal with great insight with the differing methods and concepts, and the purpose of and audience for security metrics. Chapter 5 deals concisely with points actually to be measured and where one can find them. Throughout the language is very accessible, making this book a pleasure to read and work with.
In chapter 6 the authors then provide us with a thoughtful introduction to their PRAGMATIC approach which is followed by a chapter with over 150 information security metrics. All these metrics are explained in detail, are easy to understand and thus provide a practical tool ready to use for anybody in need of reference points what and how to "measure security".
The next chapter deals concisely with the "how to". The authors provide a clear and concise explanation of how to design an information security measurement system using their method. In just about 20 pages they manage to make clear what has to go into the system, which reference points are to be considered and how everything can be pulled together in order to be able to create a system which can be easily handled and worked with as required.
The final chapters then provide the readers with more information about using metrics in general and the system of Brotby and Hinson in particular. A case study shows the practical application of the PRAGMATIC system and the final pages provide once more a wealth of helpful tools.
In summary I would like to give the following verdict: Until now I have not come across a book about information security metrics that was so clearly and concisely written. The book is easy to understand and provides a wealth of tools and inputs for anybody having to deal with metrics.
The sample metrics and the very thoughtful insights regarding the creation of an information security metrics system tailor-made for the individual organization hopefully will make this book a standard work. It is clear that the authors have thought a lot about the subject and also have practical experience in the matter, as otherwise this tome would have turned out turgid and technological, something which it clearly is not.