Information security economics: cyber security threats

被引:0
|
作者
Hojda, Mihaela Hortensia [1 ]
机构
[1] Valahia Univ Targoviste, Targoviste, Romania
关键词
cyber security; phishing; Gordon-Loeb model;
D O I
10.2478/picbe-2022-0056
中图分类号
F [经济];
学科分类号
02 ;
摘要
This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
引用
收藏
页码:584 / 592
页数:9
相关论文
共 50 条
  • [1] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [2] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [3] The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
    Lehto, Martti
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (03) : 1 - 18
  • [4] An Investigation on Cyber Security Threats and Security Models
    Thakur, Kutub
    Qiu, Meikang
    Gai, Keke
    Ali, Md Liakat
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 307 - 311
  • [5] The Economics Of Cyber Security
    Mills, Peter
    FORBES, 2013, 192 (09): : 137 - +
  • [6] Aviation and Cyber security threats
    Lehto, Martti
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 197 - 197
  • [7] A Survey on Cyber Security Threats
    Gulshan
    Chauhan, Sansar Singh
    Proceedings of International Conference on Technological Advancements and Innovations, ICTAI 2021, 2021, : 218 - 223
  • [8] Cyber security information exchange to gain insight into the effects of cyber threats and incidents
    Fransen, F.
    Smulders, A.
    Kerkdijk, R.
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2015, 132 (02): : 106 - 112
  • [9] From information security to cyber security
    von Solms, Rossouw
    van Niekerk, Johan
    COMPUTERS & SECURITY, 2013, 38 : 97 - 102
  • [10] Categorising Cyber Security Threats for Standardisation
    Khan, Zubeida Casmod
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, : 189 - 196