O'Reilly logo

Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5

Analysis Techniques

You are what you are.

Bill Parcells, on football won/loss records

If the numbers are boring, then you’ve got the wrong numbers.

Edward Tufte, Envisioning Information: Narratives of Space and Time

As demonstrated in the preceding chapter, organizations seeking to measure their security operations can draw from many potential sources of data, including systems, people, and process controls. So, aren’t metrics as simple as collecting data from these sources and letting them speak for themselves? No. In almost every case, analysts need to filter, sort, analyze, or transform the data so that they appear in a useful form. In this chapter, we will talk about some common analytical methods for making data “pop” so that the headlines ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required