Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Comparison of the Most Important Models of Investments in Cyber and Information Security

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      Vysoké učení technické v Brně, Fakulta podnikatelská
    • الموضوع:
      2022
    • Collection:
      Brno University of Technology (VUT): Digital Library / Vysoké učení technické v Brně: Digitální knihovně
    • الموضوع:
    • نبذة مختصرة :
      Purpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber security aim to minimise losses caused by cyber-attacks. In the case of investment in cyber and information security, therefore, we must evaluate the amount of loss that will never actually occur. This is a complicated problem, and several approaches have been proposed over the years to estimate the cost-benefit balance of security investments. Methodology/methods: This paper is based on previous research (Podešva et al., 2021), where two most used methods of the ROI / ROSI (Bojanc, 2008) and Gordon-Loe model (Gordon, Loeb, 2002) were identified in the field of investments in cyber and information security. Both methods are described and the advantages and limitations for further research are identified. Scientific aim: The main goal is to select the most suitable method for further research in the field of investment in cyber and information security. Findings: ROI / ROSI does not seem suitable for further research because it only tells us what percentage of return on in-vestment will be provided during a given period. The separate use of this method (ROI / ROSI) provides us with very limited results and it is necessary to combine it with other methods. On the other hand, the Gordon-Loeb model is much more complex despite several limitations, especially for coefficients ʎ and t. Further research will therefore focus on the constant t (probability of attack on a given information set) and its value will be modelled based on the SIR epidemic model on network with standard incidents (Podešva, Koch 2019). Conclusions: At present, there is no standardised approach to decision-making and the size of investments in cyber and in-formation security. This is a very complex issue, and it is very difficult to find one universal model. ...
    • File Description:
      text; 25-34; application/pdf
    • ISSN:
      1802-8527
    • Relation:
      Trendy ekonomiky a managementu; https://trends.fbm.vutbr.cz/index.php/trends/article/view/621; http://hdl.handle.net/11012/208162
    • الرقم المعرف:
      10.13164/trends.2022.39.24
    • الدخول الالكتروني :
      https://doi.org/10.13164/trends.2022.39.24
      http://hdl.handle.net/11012/208162
    • Rights:
      Creative Commons Attribution 4.0 International license ; http://creativecommons.org/licenses/by/4.0/ ; openAccess
    • الرقم المعرف:
      edsbas.F44749CA