Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information 2009
DOI: 10.1145/1558607.1558677
|View full text |Cite
|
Sign up to set email alerts
|

Total cost of security

Abstract: This is an extended abstract of the presentation of the same title for the Cyber Security and Information Intelligence Research Workshop, 2009.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…Thomas (2009b) builds on this to propose a method for pricing risk to facilitate enterprise-level risk management and risk pooling. Estimation of impact losses is a key element of their proposed methods.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Thomas (2009b) builds on this to propose a method for pricing risk to facilitate enterprise-level risk management and risk pooling. Estimation of impact losses is a key element of their proposed methods.…”
Section: Related Workmentioning
confidence: 99%
“…Borg (2005) presented a qualitative analysis of economically complex attacks and breach episodes, and discussed branching processes for consequences among others. Thomas (2009b) presented a framework for pricing risk associated with information security, and it included suggestions regarding methods to estimate frequency and severity of major breach episodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation