2016
DOI: 10.1016/j.dss.2016.02.012
|View full text |Cite
|
Sign up to set email alerts
|

Decision support approaches for cyber security investment

Abstract: When investing in cyber security resources, information security managers have to follow effective decisionmaking\ud strategies. We refer to this as the cyber security investment challenge.In this paper, we consider\ud three possible decision support methodologies for security managers to tackle this challenge. We consider\ud methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts\ud by building a framework where we can investigate the effectiveness of a cyber se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
152
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 205 publications
(155 citation statements)
references
References 28 publications
2
152
0
1
Order By: Relevance
“…In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22]. It remains that the diversion of funds away from profit-making processes and assets reduces cash flow [41]; this issue is exacerbated in small and medium-sized enterprises where there is often little or no additional funding available for cybersecurity [42]. Furthermore, unlike investors who can diversify their holdings according to their appetite for risk, managers often have limited tenure in their organizations and have little choice in dealing with the risk that their company faces.…”
Section: Theoretical Backgroundmentioning
confidence: 97%
“…In general, by allocating resources to cybersecurity capabilities, managers can not only effectively reduce potential losses due to cyberattacks, but also improve overall performance of their operations [22]. It remains that the diversion of funds away from profit-making processes and assets reduces cash flow [41]; this issue is exacerbated in small and medium-sized enterprises where there is often little or no additional funding available for cybersecurity [42]. Furthermore, unlike investors who can diversify their holdings according to their appetite for risk, managers often have limited tenure in their organizations and have little choice in dealing with the risk that their company faces.…”
Section: Theoretical Backgroundmentioning
confidence: 97%
“…It processes through a malware and doesn't require any kind of activity by the client to download [24].…”
Section: Drive-by Downloadsmentioning
confidence: 99%
“…[34] presents an interesting and well-formalized approach for situations where too few budget exists to fully implement all mitigation actions to known attack surfaces. [35], [36], and Fiedler [37] consider a defender-attacker interaction as strategic games and present well-formalized definitions and well-defined problems for winning these games based on a cost optimization. Other cost-focused approaches are proposed in [32,36,38,39].…”
Section: Related Workmentioning
confidence: 99%