• 沒有找到結果。

Computer Security – Survey and Optimal Investment

N/A
N/A
Protected

Academic year: 2021

Share "Computer Security – Survey and Optimal Investment"

Copied!
21
0
0

加載中.... (立即查看全文)

全文

(1)

1

Computer Security –

Survey and Optimal Investment

(2)

2

Outline

• Computer Crime and Security Survey

– Respondents – Key findings

• How much should be spent to improve

computer security?

(3)

3

Security Survey

1

• Respondents

– CSI/FBI 2005

– 700 computer security practitioners in US

corporations, government agencies, financial institutions, medical institutions and

(4)

4

(5)

5

(6)

6

(7)

7

(8)

8

(9)

9

(10)

10

(11)

11

Security Survey

9

(12)

12

(13)

13

(14)

14

(15)

15

(16)

16

(17)

17

(18)

18

How much should be spent?

1

• The Model (Gordon & Loeb 2002)

– Invest $z to reduce L Information System Loss Threats Vulnerability: v Attacks L Breach function: s(z), s(0)=v

(19)

19

How much should be spent?

2

• The Model

Firewall IPTable

Threat

v : probability a threat is realized

EBIS(z) = [v – s(z,v)] * L z : dollar invested in security

v * L, loss due to realized threat

(20)

20

How much should be spent?

3

(21)

21

How much should be spent?

4

• For low or high vulnerability systems, no optimal investment

• For midrange vulnerability, about 37% of expected loss

• Different breach function may have different optimal investment

參考文獻

相關文件

One of the main results is the bound on the vanishing order of a nontrivial solution to the Stokes system, which is a quantitative version of the strong unique continuation prop-

Establishments engaged in Cleaning Services increased year-on-year; numbers of those engaged in Property Management and Security Services stayed unchanged, whereas

General Entrance Requirement (2022 Entry) Chinese Language: Level 3 English Language: Level 3 Mathematics Compulsory Part: Level 2. Liberal Studies:

Teaching experience overseas and in Others (e.g. recognised local tertiary institutions and registered Day Schools offering formal curriculum courses to own

Teacher / HR Data Payroll School email system Exam papers Exam Grades /.

Classifying sensitive data (personal data, mailbox, exam papers etc.) Managing file storage, backup and cloud services, IT Assets (keys) Security in IT Procurement and

Development plan: Promote production cooperation, support cross-border cooperation between Guangdong and Macao financial institutions, support Macao banking institutions to

Quality Assessment and Compliance – SMC/IMC composition Major observations:.  SMC did not comprise all the stakeholders as managers as required in the