{"title":"网络安全的经济方面","authors":"Lukáš Václavík","doi":"10.24818/imc/2022/03.02","DOIUrl":null,"url":null,"abstract":"The ever-increasing trend of the involvement of various computing tools in the reality of organisations of all sizes brings with it the need to evaluate their security, even in the context of the activities of the entity. Virtually all organisations try to eliminate the cyber risks that arise from the use of various ICT tools by using various security tools. The implementation of these techniques entails costs that need to be justified and evaluated from the perspectives of different stakeholder groups. This text will present selected indicators assessing cybersecurity in terms of he resources invested. In addition to these metrics, selected models evaluating security investments with respect to, among other things, the existence of vulnerabilities and threats will also be presented. As this is a complex discipline, the text concludes by recommending a comprehensive approach to addressing security assurance, taking into account the requirements of the organisation, the value of its assets, the level of vulnerability or the requirements of its stakeholders","PeriodicalId":426523,"journal":{"name":"PROCEEDINGS OF THE INTERNATIONAL MANAGEMENT CONFERENCE","volume":"344 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECONOMIC ASPECTS OF CYBERSECURITY\",\"authors\":\"Lukáš Václavík\",\"doi\":\"10.24818/imc/2022/03.02\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ever-increasing trend of the involvement of various computing tools in the reality of organisations of all sizes brings with it the need to evaluate their security, even in the context of the activities of the entity. Virtually all organisations try to eliminate the cyber risks that arise from the use of various ICT tools by using various security tools. The implementation of these techniques entails costs that need to be justified and evaluated from the perspectives of different stakeholder groups. This text will present selected indicators assessing cybersecurity in terms of he resources invested. In addition to these metrics, selected models evaluating security investments with respect to, among other things, the existence of vulnerabilities and threats will also be presented. As this is a complex discipline, the text concludes by recommending a comprehensive approach to addressing security assurance, taking into account the requirements of the organisation, the value of its assets, the level of vulnerability or the requirements of its stakeholders\",\"PeriodicalId\":426523,\"journal\":{\"name\":\"PROCEEDINGS OF THE INTERNATIONAL MANAGEMENT CONFERENCE\",\"volume\":\"344 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PROCEEDINGS OF THE INTERNATIONAL MANAGEMENT CONFERENCE\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24818/imc/2022/03.02\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PROCEEDINGS OF THE INTERNATIONAL MANAGEMENT CONFERENCE","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24818/imc/2022/03.02","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The ever-increasing trend of the involvement of various computing tools in the reality of organisations of all sizes brings with it the need to evaluate their security, even in the context of the activities of the entity. Virtually all organisations try to eliminate the cyber risks that arise from the use of various ICT tools by using various security tools. The implementation of these techniques entails costs that need to be justified and evaluated from the perspectives of different stakeholder groups. This text will present selected indicators assessing cybersecurity in terms of he resources invested. In addition to these metrics, selected models evaluating security investments with respect to, among other things, the existence of vulnerabilities and threats will also be presented. As this is a complex discipline, the text concludes by recommending a comprehensive approach to addressing security assurance, taking into account the requirements of the organisation, the value of its assets, the level of vulnerability or the requirements of its stakeholders