Information security economics: cyber security threats

被引:0
|
作者
Hojda, Mihaela Hortensia [1 ]
机构
[1] Valahia Univ Targoviste, Targoviste, Romania
关键词
cyber security; phishing; Gordon-Loeb model;
D O I
10.2478/picbe-2022-0056
中图分类号
F [经济];
学科分类号
02 ;
摘要
This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
引用
收藏
页码:584 / 592
页数:9
相关论文
共 50 条
  • [31] Security of Economics Information
    Ratiu, Ioan Gheorghe
    Carstea, Claudia Georgeta
    David, Nicoleta
    Patrascu, Lucian
    Badau, Dana
    Badau, Adela
    PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING AND DATA BASES, 2010, : 114 - 119
  • [32] Cyber-Security Threats Origins and their Analysis
    Cerget, Maros
    Hudec, Jan
    ACTA POLYTECHNICA HUNGARICA, 2023, 20 (09) : 23 - 41
  • [33] Economics of information security
    Anderson, R
    Schneier, B
    IEEE SECURITY & PRIVACY, 2005, 3 (01) : 12 - 13
  • [34] The economics of information security
    Anderson, Ross
    Moore, Tyler
    SCIENCE, 2006, 314 (5799) : 610 - 613
  • [35] Economics of Cyber Security and the Way Forward
    Al Balushi, Taiseera
    Ali, Saqib
    Rehman, Osama
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2016, 6 (04) : 41 - 57
  • [36] Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
    Sommer, Florian
    Gierl, Mona
    Kriesten, Reiner
    Kargl, Frank
    Sax, Eric
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [37] EXAMINING THE RELATIONSHIP BETWEEN INFORMATION SECURITY EFFECTIVENESS AND INFORMATION SECURITY THREATS
    Masrek, Mohamad Noorman
    Soesantari, Tri
    Khan, Asad
    Dermawan, Aang Kisnu
    INTERNATIONAL JOURNAL OF BUSINESS AND SOCIETY, 2020, 21 (03): : 1203 - 1214
  • [38] ON THE SHARING OF CYBER SECURITY INFORMATION
    Luiijf, Eric
    Klaver, Marieke
    CRITICAL INFRASTRUCTURE PROTECTION IX, 2015, 466 : 29 - 46
  • [39] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [40] Improved Planning of Information Policy in the Cyber Security Sphere under Conditions of Hybrid Threats
    Dziundziuk, Viacheslav
    Krutii, Olena
    Sobol, Roman
    Kotukova, Tetiana
    Kotukov, Oleksandr
    CUESTIONES POLITICAS, 2022, 40 (74): : 741 - 763