IT security planning under uncertainty for high-impact events

被引:44
作者
Rakes, Terry R. [1 ]
Deane, Jason K. [1 ]
Rees, Loren Paul [1 ]
机构
[1] Virginia Tech, RB Pamplin Coll Business, Business Informat Technol, Blacksburg, VA 24061 USA
来源
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE | 2012年 / 40卷 / 01期
关键词
Decision making/process; Integer programming; Risk; Information systems; RISK;
D O I
10.1016/j.omega.2011.03.008
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
While many IT security incidents result in relatively minor operational disruptions or minimal recovery costs, occasionally high-impact security breaches can have catastrophic effects on the firm. Unfortunately, measuring security risk and planning for countermeasures or mitigation is a difficult task. Past research has suggested risk metrics which may be beneficial in understanding and planning for security incidents, but most of these metrics are aimed at identifying expected overall loss and do not directly address the identification of, or planning for, sparse events which might result in high-impact loss. The use of an upper percentile value or some other worst-case measure has been widely discussed in the literature as a means of stochastic optimization, but has not been applied to this decision domain. A key requirement in security planning for any threat scenario, expected or otherwise, is the ability to choose countermeasures optimally with regard to tradeoffs between countermeasure cost and remaining risk. Most of the planning models in the literature are qualitative, and none that we are aware of allow for the optimal determination of these tradeoffs. Therefore, we develop a model for optimally choosing countermeasures to block or mitigate security attacks in the presence of a given threat level profile. We utilize this model to examine scenarios under both expected threat levels and worst-case levels, and develop budget-dependent risk curves. These curves demonstrate the tradeoffs which occur if decision makers divert budgets away from planning for ordinary risk in an effort to mitigate the effects of potential high-impact outcomes. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:79 / 88
页数:10
相关论文
共 23 条
[1]  
AHUJA RK, 4464432003 MIT SLOAN
[2]  
[Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
[3]  
[Anonymous], EXECUTIVE GUIDE INFO
[4]   Necessary measures - Metric-driven information security risk assessment and decision making [J].
Baker, Wade H. ;
Rees, Loren Paul ;
Tippett, Peter S. .
COMMUNICATIONS OF THE ACM, 2007, 50 (10) :101-106
[5]  
BERINATO S, 2003, CIO MAGAZINE, V17, P1
[6]  
Bistarelli S, 2007, APPLIED COMPUTING 2007, VOL 1 AND 2, P300, DOI 10.1145/1244002.1244073
[7]   Fire scheduling for planned artillery attack operations under time-dependent destruction probabilities [J].
Cha, Young-Ho ;
Kim, Yeong-Dae .
OMEGA-INTERNATIONAL JOURNAL OF MANAGEMENT SCIENCE, 2010, 38 (05) :383-392
[8]  
*CPLEX, INTR ILOG CPLEX
[9]  
Deane J., 2009, OPER MANAGE RES, V2, P4, DOI DOI 10.1007/S12063-009-0018-2
[10]  
*ENDP SEC, SEC BREACH COST DOWN