On metrics and prioritization of investments in hardware security

被引:1
|
作者
Collier, Zachary A. [1 ]
Briglia, Brett [2 ]
Finkelston, Tom [2 ]
Manasco, Mark C. [3 ]
Slutzky, David L. [2 ]
Lambert, James H. [2 ]
机构
[1] Radford Univ, Radford, VA 24142 USA
[2] Univ Virginia, Charlottesville, VA USA
[3] Commonwealth Ctr Adv Logist Syst, Petersburg, VA USA
基金
美国国家科学基金会;
关键词
hardware security; key performance indicators; return on security investment (ROSI); risk management; security economics; systems engineering; CYBER RISK;
D O I
10.1002/sys.21667
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The security risks posed by electronics are numerous. There are typically a variety of risk-reducing countermeasures for a given system or across an enterprise. Each countermeasure is associated with both a level of risk reduction and its lifecycle costs. Given budgetary constraints, risk managers and systems engineers must determine what combinations of countermeasures cost-effectively maximize risk reduction, and what metrics best guide the investment process. In this paper, we seek to answer these questions through exploration of risk reduction metrics from the field of security economics, including the benefit/cost ratio, return on security investment (ROSI), expected benefit of information security (EBIS), and expected net benefit of information security (ENBIS). The results suggest that ratio-based metrics are not strongly correlated with risk reduction, while EBIS is equivalent to risk reduction and ENBIS is equal to risk reduction minus cost.
引用
收藏
页码:425 / 437
页数:13
相关论文
共 50 条
  • [21] STANDARDS FOR HARDWARE SECURITY
    Guin, Ujjwal
    Asadizanjani, Navid
    Tehranipoor, Mark M.
    [J]. GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2019, 23 (01) : 5 - 9
  • [22] Hardware Intrinsic Security
    Tuyls, Pim
    [J]. RADIO FREQUENCY IDENTIFICATION: SECURITY AND PRIVACY ISSUES, 2010, 6370 : 123 - 123
  • [23] Mobile Hardware Security
    Chandra, Vikas
    Aitken, Rob
    [J]. 2014 IEEE HOT CHIPS 26 SYMPOSIUM (HCS), 2014,
  • [24] Introduction to Hardware Security
    Jin, Yier
    [J]. ELECTRONICS, 2015, 4 (04): : 763 - 784
  • [25] DRIVERS OF RURAL GROWTH AND PRIORITIZATION OF PUBLIC INVESTMENTS IN CENTRAL AMERICA
    Jansen, H. G. P.
    Alwang, J.
    Pichon, F.
    Siegel, P. B.
    [J]. OPPORTUNITIES AND CHALLENGES FOR SMALLHOLDER RUMINANT SYSTEMS IN LATIN AMERICA, 2008, : 407 - 436
  • [26] Information security breaches and IT security investments: Impacts on competitors
    Jeong, Christina Y.
    Lee, Sang-Yong Tom
    Lim, Jee-Hae
    [J]. INFORMATION & MANAGEMENT, 2019, 56 (05) : 681 - 695
  • [27] Overview of cyber security: A crisis of prioritization
    Landau, S
    Landwehr, C
    Schneider, FB
    Stytz, MR
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (03) : 9 - 11
  • [28] An Information Security Incident Prioritization Method
    Imamverdiyev, Yadigar
    [J]. 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 183 - 187
  • [29] Hardware Acceleration of Video Quality Metrics
    Sundar, Deepa Palamadai
    Vaduganathan, Visala
    Chen, Xing C.
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XLIII, 2020, 11510
  • [30] The Impact of Control Information Prioritization on QoS Performance Metrics
    Barakovic, Jasmina
    Barakovic, Sabina
    Bajric, Himzo
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION THEORY, RELIABILITY, AND QUALITY OF SERVICE (CTRQ 2011), 2011, : 60 - 65