Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints

被引:59
|
作者
Huang, C. Derrick [1 ]
Behara, Ravi S. [1 ]
机构
[1] Florida Atlantic Univ, Dept Informat Technol & Operat Management, Coll Business, Boca Raton, FL 33431 USA
关键词
Cost benefit analysis; Information security; Investment analysis; Budget allocation; Scale-free network; SMALL-WORLD NETWORKS; SCALE-FREE NETWORKS; INFECTION DYNAMICS; INTERNET TOPOLOGY; RISK; SYSTEMS; MODELS;
D O I
10.1016/j.ijpe.2012.06.022
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this study we develop an analytic model for information security investment allocation of a fixed budget. Our model considers concurrent heterogeneous attacks with distinct characteristics and derives the breach probability functions based on the theory of scale-free networks. The relationships among the major variables, such as network exposure, potential loss due to a security breach, investment effectiveness, and security investment levels, are investigated via analytical and numerical analyses subject to various boundary conditions. In particular, our model shows how a firm should allocate its limited information security budget to defend against two classes of security attacks (targeted and opportunistic) concurrently. Among the results of these analyses, we find that a firm with a limited security budget is better off allocating most or all of the investment to measures against one of the classes of attack. Further, we find that managers should focus the security investment on preventing targeted attacks when the information systems are highly connected and relatively open and when the potential loss is large relative to the security budget. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:255 / 268
页数:14
相关论文
共 9 条
  • [1] The Economics of Information Security Investment
    Wang, Heng
    [J]. ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEM, PTS 1-6, 2011, 219-220 : 1550 - 1553
  • [2] Information security investment with budget constraint and security information snaring in resource-snaring environments
    Gao, Xing
    Qiu, Manting
    Wang, Ying
    Wang, Xifan
    [J]. JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2023, 74 (06) : 1520 - 1535
  • [3] Framing information security budget requests to influence investment decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    [J]. Communications of the Association for Information Systems, 2014, 35 : 133 - 143
  • [4] Framing Information Security Budget Requests to Influence Investment Decisions
    Beebe, Nicole L.
    Young, Diana K.
    Chang, Frederick R.
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2014, 35 : 133 - 143
  • [5] A COMPETITIVE ANALYSIS OF INFORMATION SECURITY INVESTMENT: THE ROLE OF HACKER ATTACKS
    Gao, Xing
    Yang, Donghui
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2023, 19 (08) : 6104 - 6129
  • [6] ECONOMICS OF INVESTMENT CRITERIA .1. CHOICE OF CRITERIA WHEN BUDGET CONSTRAINTS ARE ABSENT
    ABRAMS, HJ
    [J]. CHEMICAL ENGINEER-LONDON, 1970, (241): : C252 - &
  • [7] Economics Applied to Information Security: The Brazilian Electronic Bill of Sale Case
    Araujo, Thiago Souza
    Martina, Jean Everson
    [J]. 2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 3, 2009, : 307 - +
  • [8] A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
    Zegzhda, P. D.
    Poltavtseva, M. A.
    Pechenkin, A. I.
    Lavrova, D. S.
    Zaitseva, E. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 918 - 930
  • [9] An economic analysis of the optimal information security investment in the case of a risk-averse firm
    Huang, C. Derrick
    Hu, Qing
    Behara, Ravi S.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2008, 114 (02) : 793 - 804