Skip to main content

2016 | OriginalPaper | Buchkapitel

Optimizing Information Security Investments with Limited Budget

verfasst von : Andreas Schilling, Brigitte Werners

Erschienen in: Operations Research Proceedings 2014

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The importance of information security is constantly increasing with technology becoming more pervasive every day. As a result, the necessity and demand for practical methods to evaluate and improve information security is particularly high. The aim of this paper is to apply mathematical optimization techniques tool improve information security. According to the identified problem structure, a combinatorial optimization model is established. The objective of the presented approach is to maximize system security by choosing the best combination of security controls limited by available budget. In addition, by performing a What-If analysis and systematic budget variations, the decision maker can get improved insights and thus determine an ideal budget proposition yielding the highest benefit among all possible control configurations. An exemplary case study demonstrates how this approach can be used as a tool within the risk management process of an organization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)CrossRef Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40–46 (1999)CrossRef
2.
Zurück zum Zitat FICO (2008) Xpress-SLP: Program Reference Manual FICO (2008) Xpress-SLP: Program Reference Manual
3.
Zurück zum Zitat FICO (2009) FICO Xpress Optimization Suite: Getting Started with Xpress FICO (2009) FICO Xpress Optimization Suite: Getting Started with Xpress
4.
Zurück zum Zitat Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438–457 (2002)CrossRef Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438–457 (2002)CrossRef
5.
Zurück zum Zitat Hausken, K.: Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Inf. Syst. Front. 8(5), 338–349 (2006)CrossRef Hausken, K.: Returns to information security investment: the effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Inf. Syst. Front. 8(5), 338–349 (2006)CrossRef
6.
Zurück zum Zitat International Organization for Standardization (2008) ISO/IEC 27005 Information technology—Security techniques—Information security risk management International Organization for Standardization (2008) ISO/IEC 27005 Information technology—Security techniques—Information security risk management
7.
Zurück zum Zitat Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media Inc (2009) Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O’Reilly Media Inc (2009)
8.
Zurück zum Zitat Ryan, J.J.C.H., Mazzuchi, T.A., Ryan, D.J., de la Cruz, J.L., Cooke, R.M.: Quantifying information security risks using expert judgment elicitation. Comput. Oper. Res. 39(4), 774–784 (2012) Ryan, J.J.C.H., Mazzuchi, T.A., Ryan, D.J., de la Cruz, J.L., Cooke, R.M.: Quantifying information security risks using expert judgment elicitation. Comput. Oper. Res. 39(4), 774–784 (2012)
9.
Zurück zum Zitat Schilling, A., Werners, B.: A quantitative threat modeling approach to maximize the return on security investment in cloud computing. In: Proceedings of the 1st International Conference on Cloud Security Management, ICCSM 13, Academic Conferences and Publishing International, Reading, pp. 68–78 (2013) Schilling, A., Werners, B.: A quantitative threat modeling approach to maximize the return on security investment in cloud computing. In: Proceedings of the 1st International Conference on Cloud Security Management, ICCSM 13, Academic Conferences and Publishing International, Reading, pp. 68–78 (2013)
10.
Zurück zum Zitat Schuster, F., Holz, T.: Towards reducing the attack surface of software backdoors. In: Proceedings of the ACM Conference on Computer and Communications Security, ACM, CCS’13, pp. 851–862 (2013) Schuster, F., Holz, T.: Towards reducing the attack surface of software backdoors. In: Proceedings of the ACM Conference on Computer and Communications Security, ACM, CCS’13, pp. 851–862 (2013)
Metadaten
Titel
Optimizing Information Security Investments with Limited Budget
verfasst von
Andreas Schilling
Brigitte Werners
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-28697-6_69