2004
DOI: 10.1109/mitp.2004.89
|View full text |Cite
|
Sign up to set email alerts
|

Measuring the risk-based value of IT security solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2005
2005
2015
2015

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(38 citation statements)
references
References 1 publication
0
30
0
1
Order By: Relevance
“…Estimating the actual attack damage is usually a part of the risk assessment process [12]. While apriori measurement of actual damage for an attack is not always possible, approximate values can be estimated.…”
Section: A Evaluation Metricsmentioning
confidence: 99%
“…Estimating the actual attack damage is usually a part of the risk assessment process [12]. While apriori measurement of actual damage for an attack is not always possible, approximate values can be estimated.…”
Section: A Evaluation Metricsmentioning
confidence: 99%
“…While the approaches mentioned above consider response within the framework of intrusion handling, there is an alternative view of intrusion countermeasures assessment based on the return-on-investment (ROI) [4]. ROI is one of the commonly used metrics to estimate the efficiency of organization's security solution investments.…”
Section: Related Workmentioning
confidence: 99%
“…Generally estimating the actual damage of an attack incident is a part of the risk-based assessment of organization's security solutions [4]. While accurate measurement of damages for specific attacks is not always possible, the organization can still establish the average damage estimates.…”
Section: Assessment Of Intrusion Costmentioning
confidence: 99%
See 1 more Smart Citation
“…Often risk is expressed by measuring Annual Loss Expectancy (ALE), which is calculated by summing up the impact of outcomes in monetary units and frequency of such outcomes [6]. Further, this metric was incorporated into cost-benefit analyses to calculate Return-on-Investment (ROI) [7], [8]. Recently, risk was expressed as the product of threat occurrences and their resultant losses in US dollars, per event [9].…”
Section: Introductionmentioning
confidence: 99%