{"title":"Intrusion Detection: Making the Business Case","authors":"Carol A. Siegel","doi":"10.1201/1086/43305.8.2.19990601/31066.10","DOIUrl":null,"url":null,"abstract":"Abstract In the current atmosphere of large- scale corporate mergers and acquisitions, downsizing and eliminating redundant operations has become the norm. Couple this with massive one-time expenditures on EMU and the year 2000, the amount spent on mitigating information risk has grown in overall size but has shrunk in the area of data security. Information risk management, a term coined in the early '90s, has had to become leaner and more client-focused, implementing only what is absolutely necessary. This has left IT managers hard-pressed to cost-justify every dollar spent. With IT budgets in the millions and even billions for larger financial services companies, decisions regarding specific technology expenses can have far-reaching implications. Deploying a tool or technology across the enterprise must be thought through carefully in terms of its hard and soft costs and benefits. Thorough analysis up front can mean a faster approval cycle for the product and a more transparent implementation. The key i...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"420 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43305.8.2.19990601/31066.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract In the current atmosphere of large- scale corporate mergers and acquisitions, downsizing and eliminating redundant operations has become the norm. Couple this with massive one-time expenditures on EMU and the year 2000, the amount spent on mitigating information risk has grown in overall size but has shrunk in the area of data security. Information risk management, a term coined in the early '90s, has had to become leaner and more client-focused, implementing only what is absolutely necessary. This has left IT managers hard-pressed to cost-justify every dollar spent. With IT budgets in the millions and even billions for larger financial services companies, decisions regarding specific technology expenses can have far-reaching implications. Deploying a tool or technology across the enterprise must be thought through carefully in terms of its hard and soft costs and benefits. Thorough analysis up front can mean a faster approval cycle for the product and a more transparent implementation. The key i...