Making the Best Use of Cybersecurity Economic Models

被引:10
作者
Rue, Rachel [1 ]
Pfleeger, Shari Lawrence [1 ]
机构
[1] RAND Corp, Santa Monica, CA 90406 USA
关键词
Cybersecurity; Economic models; Security and privacy; Security function; Vulnerability;
D O I
10.1109/MSP.2009.98
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An analysis of several representative cyber security economic models that shows many assumptions are the same across disparate models and far from realistic is presented. The five models share common categories of assumptions and inputs. the (Honeyman, Schwartz, and van Assche) HSA model explores the consequences of limited information and it assumes that information about the cause of system failures is too expensive for most users to obtain. HSA also shows how the result differs if the amounts are fixed by a social engineer trying to maximize total profit over all manufacturers. The (Clark and Konrad) CK model explores resource allocation for defending multiple fronts. The Cavusoglu, Mishra, and Raghunathan (CMR) differs from other models by treating as a variable the amount of human monitoring each security package requires.
引用
收藏
页码:52 / 60
页数:9
相关论文
共 12 条
[1]  
ADKINS R, 2004, P WEIS 2004
[2]  
ANTON PS, 2004, MR1601 RAND CORP
[3]  
Brady R., 1999, 471 CAMBR U COMP LAB
[4]  
CAVUSOGLU H, 2004, COMM ACM, V47
[5]   Asymmetric conflict - Weakest link against best shot [J].
Clark, Derek J. ;
Konrad, Kai A. .
JOURNAL OF CONFLICT RESOLUTION, 2007, 51 (03) :457-469
[6]  
HAUSKEN K, 2006, RETURNS INFORM SECUR
[7]  
HONEYMAN P, 2007, P WEIS 2007
[8]  
KUMAR V, 2007, P WEIS 2007
[9]  
NAKASHIMA E, 2008, WASHINGTON POST 0126
[10]  
Ozment A, 2007, QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, P6