Advances in Information and Computer Security

  • Böhme R
  • Echizen I
  • Kunihiro N
  • et al.
ISSN: 03029743
N/ACitations
Citations of this article
100Readers
Mendeley users who have this article in their library.

Abstract

Planning information security investment is somewhere between art and science. This paper reviews and compares existing scientific approaches and discusses the relation between security investment models and security metrics. To structure the exposition, the high-level security production function is decomposed into two steps: cost of security is mapped to a security level, which is then mapped to benefits. This allows to structure data sources and metrics, to rethink the notion of security productivity, and to distinguish sources of indeterminacy as measurement error and attacker behavior. It is further argued that recently proposed investment models, which try to capture more features specific to information security, should be used for all strategic security investment decisions beneath defining the overall security budget.

Cite

CITATION STYLE

APA

Böhme, R., Echizen, I., Kunihiro, N., & Sasaki, R. (2010). Advances in Information and Computer Security. New York, 6434(61272040), 10–24. Retrieved from http://www.springerlink.com/content/2x80501410252l02/

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free