Security Decisions are Investment Decisions
Greater security investments do not necessarily translate to improvements in information security and smaller likelihoods of security breaches
Return on Security Investment RoSI
RoSI indicates the relationship between costs and benefits of a security investment and thus shows if or when information security investments lead to a Return on Investment (RoI)
R Recovery costs
S Savings
T Tools
ALE Annual Loss Expenditure (residual costs after investment)
ALE = R - S + T
RoSI = R - ALE
R-(R-S+T) = RoSI
RoSI = S - T
relies on precise monetary values therefore problematic
Effectiveness of Security Investments
Paradox: organizations allocate increasingly higher budgets for IT security but, at the same time, data breach incidents have become more frequent and severe,
Hypothesis: organization vary with respect to ho well they integrate security into their practices. Symbolic and substantive investment reflects the degree to which an organization’s activities are correctly reflected in the signals they communicate.
symbolic inv. :
-Window dressing (signaling compliance)
-But no real technical benefit as the main goal)
- e.g. investing in an outdated security technology
I
v
Ineffective in preventing data breaches
substantive investment
-Communicated signals represent adopted practices
-benefits from technology as the main goal
-e.g. full integration of a security technology into the entire IT landscape
I
v
Effective In preventing data breaches
Effectiveness of Security Investments
Kwon and Johnson distinguish between
proactive and reactive security investments
Proactive:
Reactive Investment
their study shows that proactive investments are more effective, lead to fewer security failures and less severe breaches with less affected individuals than reactive investments
Information Security Outsourcing
comissioning a managed security service provider with information security protection
Benefits:
Outsourcing risks
Cloud computing and Information security
is a model for enabling ubiquitous convenient on demand network access to a shared pool pf computing resources that can be rapidly provisioned and released with minimal management effort or. service provider interaction
three levels:
Pros and Cons of Cloud Computing
+
-
Risk assessment, safeguards, back ups, hq location, support, location of data storage, process of dealing with security breaches