Enterprise information security strategies

被引:34
作者
Anderson, Evan E. [1 ,2 ]
Choobineh, Joobin [1 ,2 ]
机构
[1] Texas A&M Univ, Mays Business Sch, College Stn, TX 77843 USA
[2] Ctr Informat Assurance & Secur, College Stn, TX USA
关键词
security costs and benefits; enterprise security requirements; information security; best practices; models of risk management;
D O I
10.1016/j.cose.2008.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security decisions are made at every level of an organization and from diverse perspectives. At the tactical and operational levels of an organization, decision making focuses on the optimization of security resources, that is, an integrated combination of plans, personnel, procedures, guidelines and technology that minimize damages and losses. While these actions and tactics reduce the frequency and/or consequences of security breaches, they are bounded by the organization's global security budget. At the strategic, enterprise level management must answer the question, "What is the security budget (cost expenditures), where each dollar spent on security must be weighed against alternative non-security expenditures, that is justified by the foregone (prevented) losses and damages?" The answer to that question depends on the tolerances of decision makers for risk and the information employed to reach it. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:22 / 29
页数:8
相关论文
共 29 条
[1]   Why information security is hard - An economic perspective [J].
Anderson, R .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :358-365
[2]  
[Anonymous], 1970, SECURITY CONTROLS CO
[3]  
ARZAC E, 1977, J FINANC ECON, V14, P277
[4]  
Blakley B., 2001, ASS COMPUTING MACHIN, P97
[5]   A model for evaluating IT security investments [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (07) :87-92
[6]   The value of intrusion detection systems in information technology security architecture [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) :28-46
[7]   Information security management: A hierarchical framework for various approaches [J].
Eloff, MM ;
von Solms, SH .
COMPUTERS & SECURITY, 2000, 19 (03) :243-256
[8]  
Farquhar B., 1991, Computers & Security, V10, P21, DOI 10.1016/0167-4048(91)90051-E
[9]   Information systems risk management: Key concepts and business processes [J].
Finne, T .
COMPUTERS & SECURITY, 2000, 19 (03) :234-242
[10]  
GEHANI A, 2004, P WORKSH FDN COMP SE, P1