Economics of Information Security Investment Integrated with IDS and Attacker’s Behavior

Article Preview

Abstract:

ROSI (Return On Security Investment) has attracted a great deal of attention in recent years. By inheriting Gordon and Loeb 2002 security breach probability function, we present an adaptive economics model of investment in information security integrating dynamic characteristics of outside threat probability and detective mechanism, and deduce some guidelines for optimal investment amount.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

928-931

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Lawrence A. Gordon and Martin P. Loeb, The Economics of Information Security Investment, ACM Transactions on Information and System Security, Vol. 5, No. 4, Nov. 2002, Pages 438-457.

DOI: 10.1145/581271.581274

Google Scholar

[2] Maiwald, E., Network security: A beginner's guide, Osborne/McGrawHill, Berkeley, CA, (2001).

Google Scholar

[3] Huseyin Cavusoglu and Srinivasan Raghunathan, Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches, International Conference on Information Systems (ICIS), Dec. (2003).

Google Scholar

[4] J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, M. Huang and J. Asbery, Intrusion-Detection for Incident-Response: using a military battlefield-intelligence process, Computer Networks, 34 (2000) 671-697.

DOI: 10.1016/s1389-1286(00)00142-0

Google Scholar

[5] Flaviu Cristian, A recovery mechanism for modular software, Proceedings of the 4th international conference on Software engineering, Munich, Germany, (1979).

Google Scholar

[6] Ken Sakamura, Koichi Nakano, Yoshio Kato, and Hideo Aiso, A new approach to an adaptive computer—an automatic recovery mechanism to prevent the occurrence of subtract errors, Proceedings of the 6th annual symposium on Computer architecture.

DOI: 10.1145/800090.802890

Google Scholar

[7] Icove, D.J. Collaring the cybercrook: an investigator's view; IEEE Spectrum, Jun 97 31-36.

DOI: 10.1109/6.591662

Google Scholar

[8] Landreth, B. (1985). Out of the Inner Circle,. Redmond, Microsoft Books. Lia, B. (2000).

Google Scholar