• 제목/요약/키워드: Security Investments

검색결과 80건 처리시간 0.017초

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제21권4호
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.79-101
    • /
    • 2012
  • This study expands the current body of research by exploring multiple scenarios of insufficient and excessive IT security investments caused by interdependent risks and the interplay between IT security investments and cyber insurance. A key finding is that organizations experiencing interdependent risks with different types of cyber attacks (i.e., targeted and untargeted attacks) use different strategies in making IT security investment decisions and in purchasing cyber insurance policies for their information security risk management than firms that are facing independent risks. The study further provides an economic rationale for employing insurance mechanisms as a risk management solution for information security.

  • PDF

디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구 (A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era)

  • 정병호;주형근
    • 디지털산업정보학회논문지
    • /
    • 제20권1호
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.

정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석 : 정보보안 교육 서비스 투자를 중심으로 (An Empirical Study of Relationship between Information Security Investment and Information Security Incidents : A Focus on Information Security Training, Awareness and Education Service Sector)

  • 이한솔;채상미
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.269-281
    • /
    • 2018
  • 정보화 사회에서 핵심 가치로 평가받고 있는 자원은 정보 그 자체이다. 이런 이유로 기업의 가치 있는 정보를 노리는 시도가 많아지며 정보보안 사고가 급증하고 있다. 기업에서는 정보보안 사고를 예방하기 위해 다양한 정보보안 부문에 투자하고 있으나, 어떤 부문에 대한 투자가 정보보안 사고를 감소시키는 데에 직접적으로 기여하는지는 잘 알지 못한 채 투자하고 있다. 기업의 대표적인 정보보안 투자 부문인 제품뿐만 아니라 대표적인 정보보안 서비스 사업으로 각광받고 있는 정보보안 교육 및 훈련, 보안관제 서비스, 그리고 취약점 분석의 투자 효용을 알아보기 위해 본 연구를 진행하였다. 한국 인터넷 진흥원의 2014년 정보보호 실태 조사의 원자료를 이용하고, 총 정보보안 사고건수를 종속변수로 두고 음이항분포 회귀분석을 실시한 결과 교육 서비스와 취약점 분석 서비스가 정보보안 사고를 줄이는 데에 유의미하게 기여하는 것으로 판단되었다. 이 연구는 학문적으로는 정보보안 경제학을 이론적 배경으로하여 정보보안 투자 부문의 실제 효용을 파악한 연구이며, 실증적으로는 조직에서 한정된 자원을 정보보안 투자에 배분할 때 효율적인 의사결정을 하는 데에 지침을 제공할 수 있는 연구이다.

국가단위 신규 IT인프라의 위험도 등급화 기법 개발 방향 연구 (Development Strategy on the Risk Rating Method for Nationwide Emerging IT Infrastructure)

  • 김상균
    • 산업기술연구
    • /
    • 제30권B호
    • /
    • pp.11-16
    • /
    • 2010
  • To provide a development strategy on the method which assesses a potential risk of nationwide emerging IT infrastructure in planning and design phase, and to classify the assessment result into 5 levels is the goal of this research. The development strategy provided in this paper could improve a benefit-cost-ratio of investments on emerging IT infrastructure. With a premature assessment of the potential risks of a nationwide emerging IT infrastructure which needs astronomical amount of public funds, it could show a way of systematic investments on security systems and improve a benefit-cost-ratio of investments on emerging IT infrastructure. Also, this approach might improve the safety of nationwide IT infrastructure. It could identify and provide an optimized solution for the potential risks of nationwide IT infrastructure.

  • PDF

A Coherent Model in Upholding General Deterrence Theory and Impact to Information Security Management

  • Choi, Myeong-Gil;Ramos, Edwin R.;Kim, Man-Sig;Kim, Jin-Soo;Whang, Jae-Hoon;Kim, Ki-Joo
    • Journal of Information Technology Applications and Management
    • /
    • 제16권3호
    • /
    • pp.73-86
    • /
    • 2009
  • To establish an effective security strategy, business enterprises need a security benchmarking tool. The strategy helps to lessen an impact and a damage in any threat. This study analyses many aspects of information security management and suggests a way to deal with security investments by considering important factors that affect security manager's decision. To address the different threats resulting from a major cause of accidents inside an enterprise, we investigate an approach that followed ISO17799. We unfold a criminology theory that has designated many measures against the threat as suggested by General Deterrence Theory. The study proposes a coherent model of the theory to improve the security measures especially in handling and protecting company assets and human lives as well.

  • PDF

위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링 (The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat)

  • 김민식;임종인
    • 융합보안논문지
    • /
    • 제9권1호
    • /
    • pp.39-44
    • /
    • 2009
  • 보안 투자에 대한 정당성을 확보하기 위해 보안 투자에 대한 투자대비효과 분석이 반드시 요구된다. 본 논문에서는 최적의 보안 투자 의사결정을 어렵게 하는 요소들을 고려함과 동시에 투자대비효과를 정량적인 수치로 표현하여 효과적인 의사 결정을 지원할 수 있는 모델링을 제안한다. 본 모델링은 최적의 정보보안 솔루션을 선정하기 위하여 잔여 위험 수치를 판단 기준으로 활용하고, 가용한 정보보안 솔루션 중에서 정보보안 솔루션들의 위협별 대응기술들의 상관관계를 고려하여 정확성을 높여준다.

  • PDF

신뢰성이론을 바탕으로 한 통합 컴퓨터 보안 모형에 관한 연구 (An Integrated Computer Security Model Based on the General Trust Theory)

  • 이상근;유상진
    • Asia pacific journal of information systems
    • /
    • 제12권1호
    • /
    • pp.123-138
    • /
    • 2002
  • For the last two decades, there has been much research on computer abuse from the perspective of the general deterrence theory based on objectism, which covers security policy, security awareness programs, and physical security system. The traditional view offered by the general deterrence theory indicates that security policy, security awareness, and security system play a major role in preventing computer abuse. In spite of continuous organizational efforts and investments based on these systematic factors, the incidence of computer abuse in organizations is still rapidly increasing. This paper proposes another perspective-the social control theory based on subjectism-in preventing computer abuse. According to the social control theory, organizational trust, which comprises organizational attachment, commitment, involvement and norms, can prevent computer abuse by reducing insider's computer abuse. The aim of this article is to assess the role of organizational trust come from attachment, commitment, involvement, norms in preventing computer abuse. The results indicate that both organizational trust and deterrent factors are effective in preventing computer abuse.

중소기업 환경에서 악성코드 유형 분석과 대응 방안 (Analysis and Countermeasure of Malicious Code in Small Businesses)

  • 홍준석;김영희;박원형;국광호
    • 융합보안논문지
    • /
    • 제15권7호
    • /
    • pp.55-62
    • /
    • 2015
  • 현재 각종 PC 및 정보시스템의 발전으로 인하여 인터넷이 급속도로 확산되고 있으며 이러한 인터넷 사용 증가에 따른 악성코드의 위협이 심각하게 나타나고 있다. 특히 보안인력 및 투자가 부족한 중소기업은 중요서버 및 내부 PC 대상으로 악성코드에 감염되었더라도 확인 및 조치가 불가능한 실정이다. 중소기업에서 실시하고 있는 중앙 집중형 방식의 보안관제형 악성코드탐지서비스를 분석하고 대응방안을 제시한다.

A Study on Risk Management for Export Control on Strategic Trade in Supply Chain Management

  • Roh, Tae-Hyun;Park, Jin-Hee
    • 한국항해항만학회지
    • /
    • 제37권6호
    • /
    • pp.709-718
    • /
    • 2013
  • In this study, AHP analysis was conducted through a survey that was organized by 9 job categories. The results show that sustainable operation risks have the highest priority level among all criteria with management interest having the highest priority level within sustainable operation risks related attributes. The most important risk attributes among stakeholder risks appeared to be asset security and cargo and conveyance security, with education and training being the most important among regulatory risks. Effective management and response to the risks from export controls on strategic trade require an understanding of supply chain security and compliance programs, effective training programs, investments for development of security systems that meet international standards. In addition, the government needs to focus on developing professionals and providing support for companies with compliance programs, working closely with businesses.