An information security risk-driven investment model for analysing human factors

被引:22
作者
Alavi, Reza [1 ]
Islam, Shareeful [1 ]
Mouratidis, Haralambos [2 ]
机构
[1] Univ East London, London, England
[2] Univ Brighton, Brighton, E Sussex, England
关键词
Information security (IS); Information security risk-driven investment model (RIDIM); Risk; Social engineering attacks (SEAs); S; Security investment (SI); Return on investment in information security (ROISI);
D O I
10.1108/ICS-01-2016-0006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - The purpose of this paper is to introduce a risk-driven investment process model for analysing human factors that allows information security managers to capture possible risk-investment relationships and to reason about them. The overall success of an information security system depends on analysis of the risks and threats so that appropriate protection mechanism can be in place to protect them. However, lack of appropriate analysis of risks may potentially results in failure of information security systems. Existing literature does not provide adequate guidelines for a systematic process or an appropriate modelling language to support such analysis. This work aims to fill this gap by introducing the process and reason about the risks considering human factors. Design/methodology/approach - To develop risk-driven investment model along with the activities that support the process. These objectives were achieved through the collection of quantitative and qualitative data utilising requirements engineering and secure tropos methods. Findings - The proposed process and model lead to define a clear relationship between risks, incidents and investment and allows organisations to calculate them based on their own figures. Research limitations/implications - One of the major limitations of this model is that it only supports incident-based investment. This creates some sort of difficulties to be presented to the executive board. Secondly, because of the nature of human factors, quantification does not exactly reflect the monetary value of the factors. Practical implications - Applying the information security risk-driven investment model in a real case study shows that this can help organisations apply and use it in other incidents, and more importantly, to the incidents which critical human factors are a grave concern of organisations. The importance of providing a financial justification is clearly highlighted and provided for seeking investment in information security. Social implications - It has a big social impact that technically could lead for cost justifications and decision-making process. This would impact the whole society by helping individuals to keep their data safe. Originality/value - The novel contribution of this work is to analyse specific critical human factors which have subjective natures in an objective and dynamic domain of risk, security and investment.
引用
收藏
页码:205 / 227
页数:23
相关论文
共 26 条
[1]  
Alavi Reza, 2013, International Journal of Secure Software Engineering, V4, P50, DOI 10.4018/jsse.2013010104
[2]  
Alavi Reza, 2014, Human Aspects of Information Security, Privacy, and Trust. Second International Conference, HAS 2014, Held as Part of HCI International 2014. Proceedings: LNCS 8533, P297, DOI 10.1007/978-3-319-07620-1_26
[3]  
[Anonymous], 2013, 27001 ISOIEC
[4]  
Brotby Krag. W., 2009, INFORM SECURITY MANA
[5]   Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits [J].
Greitzer, Frank L. ;
Strozer, Jeremy R. ;
Cohen, Sholom ;
Moore, Andrew P. ;
Mundie, David ;
Cowley, Jennifer .
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, :236-250
[6]  
Hadnagy C., 2010, SOCIAL ENG ART HUMAN
[7]   Capital market reaction to defective IT products: The case of computer viruses [J].
Hovav, A ;
D'Arcy, J .
COMPUTERS & SECURITY, 2005, 24 (05) :409-424
[8]   Social phishing [J].
Jagatic, Tom N. ;
Johnson, Nathaniel A. ;
Jakobsson, Markus ;
Menczer, Filippo .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :94-100
[9]  
Janczewski L. J., 2010, Proceedings 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010), P847
[10]   Specification of a capability-based IT classification framework [J].
Mulligan, P .
INFORMATION & MANAGEMENT, 2002, 39 (08) :647-658