An economic modelling approach to information security risk management

被引:89
|
作者
Bojanc, Rok
Jerman-Blazic, Borka [1 ]
机构
[1] Univ Ljubljana, Fac Econ, Ljubljana, Slovenia
关键词
ICT security tools; risk management; technology investment;
D O I
10.1016/j.ijinfomgt.2008.02.002
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
This paper presents ail approach enabling economic modelling of information security risk management in contemporaneous businesses and other organizations. In the world of permanent cyber attacks to ICT systems, risk management is becoming a crucial task for minimization of the potential risks that can endeavor their operation. The prevention of the heavy losses that may happen due to cyber attacks and other information system failures in an organization is usually associated with Continuous investment in different security measures and purchase of data protection systems. With the rise of the potential risks the investment in security services and data protection is growing and is becoming a serious economic issue to many organizations and enterprises. This paper analyzes several approaches enabling assessment of the necessary investment in security technology from the economic point of view. The paper introduces methods for identification of the assets, the threats, the vulnerabilities of the ICT systems and proposes a procedure that enables selection of the optimal investment of the necessary security technology based on the quantification of the values of the protected systems. The possibility of using the approach for an external insurance based on the quantified risk analyses is also provided. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:413 / 422
页数:10
相关论文
共 50 条
  • [21] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [22] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [23] A risk recommendation approach for information security risk assessment
    Chu, Ya-Chi
    Wei, Yu-Chih
    Chang, Wen-Hsuan
    [J]. 2013 15TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2013,
  • [24] Evaluation management conflicts as an economic security approach
    Podolchak, N. Y.
    Kovalchuk, G. R.
    Blynda, Y. O.
    [J]. INTERNATIONAL SCIENTIFIC DAYS 2016: THE AGRI-FOOD VALUE CHAIN: CHALLENGES FOR NATURAL RESOURCES MANAGEMENT AND SOCIETY, 2016, : 279 - 287
  • [25] The Case for improvisation in information Security Risk Management
    Njenga, Kennedy
    Brown, Irwin
    [J]. E-GOVERNMENT, E-SERVICES AND GLOBAL PROCESSES, 2010, 334 : 220 - +
  • [26] A Dependency analysis for Information Security and Risk Management
    Krishna, B. Chaitanya
    Subrahmanyam, Kodukula
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 205 - 210
  • [27] Performance metrics for information security risk management
    Ryan, Julie J. C. H.
    Ryan, Daniel J.
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 38 - 44
  • [28] Information technology, security and risk management (paperback)
    Fitz-Gerald, S.
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2008, 59 (08) : 1146 - 1147
  • [29] INFORMATION SECURITY ASPECT OF OPERATIONAL RISK MANAGEMENT
    Zawila-Niedzwiecki, Janusz
    Byczkowski, Maciej
    [J]. FOUNDATIONS OF MANAGEMENT, 2009, 1 (02) : 45 - 60
  • [30] Information Chaos, Risk Management and Cyber Security
    Capek, Jan
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON STRATEGIC MANAGEMENT AND ITS SUPPORT BY INFORMATION SYSTEMS, 2015, : 36 - 45