• List Price: CDN$ 128.29
  • You Save: CDN$ 27.40 (21%)
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Information Security Mana... has been added to your Cart
+ CDN$ 6.49 shipping
Used: Good | Details
Sold by calibris
Condition: Used: Good
Comment: Ships from the USA. Used good condition: moderate wear, may have limited notes and/or highlighting. Please allow 10-15 business days for delivery
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement Hardcover – Mar 30 2009

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
CDN$ 100.89
CDN$ 100.01 CDN$ 65.91

Unlimited FREE Two-Day Shipping for Six Months When You Try Amazon Student

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Hardcover: 200 pages
  • Publisher: Auerbach Publications; 1 edition (March 30 2009)
  • Language: English
  • ISBN-10: 1420052853
  • ISBN-13: 978-1420052855
  • Product Dimensions: 1.9 x 15.9 x 23.5 cm
  • Shipping Weight: 476 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #1,871,894 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

Enterprise Security Architect, Thousand Oaks, California,

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x9f774870) out of 5 stars 3 reviews
5 of 7 people found the following review helpful
HASH(0x9f545144) out of 5 stars Conceptual framework for a tough topic Nov. 22 2010
By Dr. G. Hinson - Published on Amazon.com
Format: Hardcover Verified Purchase
Measuring information security is the greatest remaining challenge for many of us. Metrics are essential for a scientific management approach, rather than relying purely on gut feel and guesswork. Standards such as ISO/IEC 27001 require the use of objective information about the status and effectiveness of information security controls in relation to the risks, in order to drive appropriate improvements in the Information Security Management System. However, it is not immediately obvious exactly what needs measuring, nor how to do it. This book lays out the foundations on which a rational measurement system can be designed to manage information security in a more objective fashion.

The author encourages readers to consider a wide variety of measurement approaches and apply them sensibly to their information security management issues. In addition to conventional information security metrics, the book draws on governance, risk management, financial management and business analysis methods, a more diverse range of approaches than is normally covered in this field. Introducing measures of organization structure and culture sets this security metrics book apart from most others.

Although the writing style is clear, this is a complex subject covered in depth. Being rather theoretical in approach, the book won't suit practitioners simply looking for a short checklist of `security things to measure'. However, those with the interest and time to study Information Security Management Metrics will be rewarded with a deeper and more rounded understanding of the issue. As such, the book is probably of most value to CISOs and ISMs tasked with implementing better security metrics, and to information security management students.
1 of 2 people found the following review helpful
HASH(0x9f4d4ba0) out of 5 stars Think twice before buying July 7 2013
By Koala - Published on Amazon.com
Format: Hardcover
As one reviewer noted, the coverage is very superficial. The book included some rather obscure models that I have never seen it used in the real world. Perhaps the book is simply mis-titled. For the practitioners in the field who read the book and start digging a little deeper, you'd get the sense that the author really didn't have much hands-on experience. One particular paragraph and chart caught my eye.

Page. 68, the paragraph and chart on a study of the ROSI of various activities, based on a whitepaper from @Stake. The author provided no interpretation for the chart. The book claims it's based on an analysis of over 600 organisations. And wrote an insightful observation, "These results will undoubtedly be controversial and lead to energetic protests..." The following was what trouble me.

Here is a short version of what the "saving to cost ratio" chart suggests: (1)Screen Locking has a 71.9% effectiveness in improving security; whereas things like (2) Nightly Back-up (only 0.2%) and (3) Central Access Control (0.1%). Firewall, IDS, patches...etc are in between (all below 10%)

Any security professional who saw the chart and read the "insight" would question the findings and probably dig a bit deeper. I did. As it turns out, through a thin connection of mine who knows a guy who knows another guy who used to work for @Stake.

They couldn't find any whitepaper on a ROSI study of 600+ organisations. (Doesn't mean it's not there, but he couldn't find it.)

The cited source of the chart did worked for @Stake for a year or so. However, the chart actually came from the source's PhD thesis while he was an economic graduate at Stanford University. (I am actually reading his paper from my desktop as I type this) I am just going to copy the following verbatim, straight from the PhD thesis... in reference to the "saving to cost ratio" chart,

"The savings were calculated by assuming that each safeguard was implemented in isolation."

So.... how many of you implemented screen saver locking "in isolation" ? or turn on your nightly backup "only" and nothing else as a security measure ? Don't get me wrong, it was actually quite an interesting paper, well worth the read. I believe the paper actually got quite a bit of press coverage when it was first released.

The only thing "controversial" about this is How did the author miss that ? (book author, not the original source)

Two stars for the end of chapters References.
1 of 2 people found the following review helpful
HASH(0x9f4df00c) out of 5 stars High level collection of what's out in wild May 12 2013
By VPS - Published on Amazon.com
Format: Hardcover Verified Purchase
At the most, you can say that it's a good collection of what's out and about. Too much focus on few quantitative measures, and too little on 'Security metrics'.

By no means it can be called "a definitive guide ...." It neither provides any ideas on 'monitoring' nor on real 'measurement metrics.'

The index available as free download is misleading. It appears to cover a lot of ground and led me to purchase. However, if Goggling those topics or Wiki on any of those topics will provide more information than the narrative.

I found the "Contents index" more useful than the book itself.