skip to main content
article
Free Access

Analyzing security costs

Published:01 June 2003Publication History
Skip Abstract Section

Abstract

Quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs.

References

  1. Adams, J. Cars, Cholera, and Cows: The Management of Risk and Uncertainty. Cato Institute, March 1999.Google ScholarGoogle Scholar
  2. Anderson, R. Why Information Security is Hard---An Economic Perspective. Sept. 2001; www.cl.cam.ac.uk/~rja14/econsec.htmlGoogle ScholarGoogle Scholar
  3. Beattie, A. et al. Timing the application of security patches for optimal uptime. In Proceedings of LISA '02: Sixteenth Systems Administration Conference, USENIX Association (Nov. 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brookings Institution. Interdependent Security: Implications for Homeland Security Policy and Other Areas. Policy Brief #108, Oct. 2002.Google ScholarGoogle Scholar
  5. Clarke, R. Computer matching by government agencies: The failure of cost/benefit analysis as a control mechanism. Information Infrastructure and Policy 4, 1 (Mar. 1995); www.anu.edu.au/people/Roger.Clarke/DV/MatchCBA.htmlGoogle ScholarGoogle Scholar
  6. Federal Information Processing Standards. Guideline for the Analysis of Local Area Network Security. National Institute of Standards and Technology, FIPS PUB 191, Nov. 1994; www.itl.nist.gov/fipspubs/fip191.htmGoogle ScholarGoogle Scholar
  7. Gordon, L.A. and Loeb, M.P. Return on information security investments: Myths vs. realities. Strategic Finance Magazine (Nov. 2002); www.strategicfinancemag.com/2002/11i.htmGoogle ScholarGoogle Scholar
  8. Office of the Deputy Chief Information Officer. Cost-Benefit Analysis Guide for NIH IT Projects. Center for Information Technology, National Institutes of Health, May 1999; wwwoirm.nih.gov/itmra/cbaguide.htmlGoogle ScholarGoogle Scholar
  9. Silverman, R.D. A cost-based security analysis of symmetric and asymmetric key lengths. RSA Laboratories Bulletin 13 (Apr. 2000).Google ScholarGoogle Scholar
  10. Wei, F. et al. Cost-benefit analysis for network intrusion detection systems. In Proceedings of the CSI 28th Annual Computer Security Conference, (Oct. 2001).Google ScholarGoogle Scholar

Index Terms

  1. Analyzing security costs

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 46, Issue 6
              E-services: a cornucopia of digital offerings ushers in the next Net-based evolution
              June 2003
              89 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/777313
              Issue’s Table of Contents

              Copyright © 2003 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 June 2003

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format