The protection of assets, including IT resources, intellectual property and business processes, against security attacks has become a challenging task for organizations. From an economic perspective, firms need to minimize the probability of a successful security incident or attack while staying within the boundaries of their information security budget in order to optimize their investment strategy. In this paper, an optimization model to support information security investment decision-making in organizations is proposed considering the two convicting objectives (simultaneously minimizing the costs of countermeasures while maximizing the security level). Decision models that support the firms’ decisions considering the trade-off between ...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
With billions of dollars being spent on information security related products and services each year...
The need to protect resources against attackers is reflected by huge information security investment...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Information systems are an integral part of today\u27s business environment. Businesses, government ...
With increasing level of security threats and constant budget limitations, it is critical for a comp...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
This paper presents a portfolio optimization approach to information technology (IT) security invest...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Organizations invest in perimeter hardening as well as intrusion detection systems, but often under ...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
With billions of dollars being spent on information security related products and services each year...
The need to protect resources against attackers is reflected by huge information security investment...
The protection of assets, including IT resources, intellectual property and business processes, agai...
Information systems are an integral part of today\u27s business environment. Businesses, government ...
With increasing level of security threats and constant budget limitations, it is critical for a comp...
In this paper, we present a new quantitative optimization model to support decision makers in determ...
AbstractChoosing an optimal investment in information security is an issue most companies face these...
Open Access journalChoosing an optimal investment in information security is an issue most companies...
Kiesling E, Ekelhart A, Grill B, Strauss C, Stummer C. Selecting security control portfolios: A mult...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
This paper presents a portfolio optimization approach to information technology (IT) security invest...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Organizations invest in perimeter hardening as well as intrusion detection systems, but often under ...
Information security is becoming an increasingly serious problem faced by many enterprises and organ...
With billions of dollars being spent on information security related products and services each year...
The need to protect resources against attackers is reflected by huge information security investment...