2012
DOI: 10.1016/j.omega.2011.03.008
|View full text |Cite
|
Sign up to set email alerts
|

IT security planning under uncertainty for high-impact events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…which makes them very to apply in practice. [20] lower input data requirements by using discrete scales for probability and impact values. It is, however, still problematic since finding a trade-off between costs and risk requires both to be measured accurately.…”
Section: Decision Support For Proposing Optimal Safeguardsmentioning
confidence: 99%
“…which makes them very to apply in practice. [20] lower input data requirements by using discrete scales for probability and impact values. It is, however, still problematic since finding a trade-off between costs and risk requires both to be measured accurately.…”
Section: Decision Support For Proposing Optimal Safeguardsmentioning
confidence: 99%
“…By comparing the budget and the expected damage after conducting cybersecurity risk assessment, and optimal amount of investment could be obtained. The reference [28] provided a model to the key requirement in security planning for any threat scenario and apply specific countermeasures. The reference [10] proposed Risk Assessment and Optimization Model (RAOM) to solve the security countermeasure selection problem, where variables such as financial cost and risk may affect the final decision of risk level.…”
Section: Decision Support Modelsmentioning
confidence: 99%
“…Viduto et al (2012) also proposed a bi-objective model that considers the trade-off between financial costs and risk. Rakes et al (2012) argue that, in addition to expected losses, sparse events that might result in high-impact losses should be considered, too. They proposed a model that minimizes the total loss caused by security incidents.…”
Section: Related Workmentioning
confidence: 99%
“…Thereby, threat criticality is reduced at a decreasing rate if more safeguards are selected. This interdependence of safeguards models the fact that security investments have a diminishing marginal utility (Schilling & Werners, 2014, Rakes et al, 2012, Sawik, 2013. Considering all safeguards at once we get the following equation to calculate the remaining criticality index of threat i after selecting safeguards according to s k :…”
Section: Accepted Manuscriptmentioning
confidence: 99%