Assessing Economic Impact due to Cyber Attacks with System Dynamics Approach

被引:0
作者
Roumani, Mehrnaz Akbari [1 ]
Fung, Chun Che [1 ]
Choejey, Perna [1 ]
机构
[1] Murdoch Univ, Sch Engn & Informat Technol, Perth, WA, Australia
来源
2015 12TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON) | 2015年
关键词
cyber security; system dynamics; security investment; economic impact; FRAMEWORK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security has become a serious challenge for organizations due to growing use of the Internet and increasing values of information that are stored in organizations' information systems. Because of the complexity and the number of different variables involved with information security, a special analytical tool is required to address the problem of how to balance the investment in different parts of the system in order to reduce the losses due to cyber attacks. Using the System Dynamics approach as an effective analytical tool is proposed to demonstrate dealing of complex situations due to cyber attacks involving different variables such as attractiveness of targets to losses, and their inter-relationships. Using this model, a casual loop diagram can be used to present an overview of the model and its associated variables. The model is based on quantitative measurements of security and the time that attackers may need to compromise a system. The model will assist in achieving the balance between investment on security and the resultant reduction of losses due to cyber attacks.
引用
收藏
页数:6
相关论文
共 26 条
[1]  
[Anonymous], 2012, 2011 COST DAT BREACH
[2]  
Behara Ravi S, 2010, J INFORM SYSTEM SECU, V6
[3]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422
[4]  
Bojanc Rok, 2012, P MAN KNOWL LEARN IN
[5]   Reflecting on 20 SEC conferences [J].
Botha, Reinhardt A. ;
Gaadingwe, Tshepo G. .
COMPUTERS & SECURITY, 2006, 25 (04) :247-256
[6]   A model for evaluating IT security investments [J].
Cavusoglu, H ;
Mishra, B ;
Raghunathan, S .
COMMUNICATIONS OF THE ACM, 2004, 47 (07) :87-92
[7]   Decision-theoretic and game-theoretic approaches to IT security investment [J].
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan ;
Yue, Wei T. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :281-304
[8]   Computer crimes: theorizing about the enemy within [J].
Dhillon, G ;
Moores, S .
COMPUTERS & SECURITY, 2001, 20 (08) :715-723
[9]  
Foroughi Farhad, 2008, P WORLD C ENG
[10]  
Forrester J.W., 1978, Tests for building confidence in system dynamics models