The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Analyzing Risks to Determine a New Return on Security Investment: Optimizing Security in an Escalating Threat Environment
Abstract
This chapter expands upon standard methods of calculating the return on security investment (ROSI) in several ways. First, it accounts for the dynamic nature of threats, vulnerabilities, and defenses as they apply to the finance sector. Second, it takes a more holistic view of security investments using a portfolio method. The protection of information assets can be viewed in two ways. One is the hierarchical view of security measures, such as avoidance, deterrence, and prevention. The other is defense in depth, wherein various security tools and processes, such as firewalls, identity and access management, and intrusion detection and prevention products, are combined for greater overall protection. The reader will gain a deeper understanding of the factors that affect the risks and returns of investments in security measures, tools, and processes and will find that using the portfolio approach leads to more cost-effective security.
Related Content
V. V. Devi Prasad Kotni, Sujit Kumar Patra, Sunil Kumar.
© 2024.
21 pages.
|
Adekunle Alexander Balogun, Gbenga Olorunmade.
© 2024.
15 pages.
|
Ashwani Sharma, Nitpal Singh Rathod.
© 2024.
15 pages.
|
Peterson K. Ozili.
© 2024.
11 pages.
|
Yusuf Olatunji Oyedeko, Adesola Trust Gbadebo.
© 2024.
15 pages.
|
Oladapo Fepetu, Pelumi Abdulmalik Adewumi.
© 2024.
21 pages.
|
Rifkatu Nghargbu.
© 2024.
16 pages.
|
|
|