Security Metrics: Replacing Fear, Uncertainty, and Doubt -- Chapter 3, Application Security Metrics

As a registered member of SearchAppSecurity.com, you're entitled to a complimentary excerpt from Security Metrics: Replacing Fear, Uncertainty, and Doubt written by Andrew Jaquith and published by Addison Wesley Professional.

This excerpt

Requires Free Membership to View

specifically addresses application security metrics. Jaquith discusses how to measure the security of an application and outlines three methods: by counting remotely and locally exploitable flaws without knowledge of the code (black-box metrics), by counting design and implementation flaws in the code (code security metrics) and by creating qualitative risk indices using a weighted scoring system (qualitative process metrics and indices).


Book description:
Security Metrics is the first comprehensive best-practice guide to defining, creating and utilizing security metrics in the enterprise.

Using sample charts, graphics, case studies and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement and craft compelling messages for senior management.

Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to do the following:


  • Replace nonstop crisis response with a systematic approach to security improvement
  • Understand the differences between "good" and "bad" metrics
  • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk
  • Quantify the effectiveness of security acquisition, implementation, and other program activities
  • Organize, aggregate, and analyze your data to bring out key insights

>> Read the excerpt on application security metrics.

>> Buy the book



This was first published in April 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.