{"title":"量化和降低安全成本-硬通货","authors":"Philip Carden","doi":"10.1201/1086/43301.7.4.19990101/31016.5","DOIUrl":null,"url":null,"abstract":"Abstract Businesses today use the Internet primarily as a means of providing fast convenient access to public information. But, the potential business uses go much further. Electronic commerce, for example, significantly will lower the cost of dayto-day business transactions, and virtual private networks provide a lower-cost alternative to traditional data and even voice networks. However, these advanced uses of the Internet require a stronger security infrastructure than most companies have in place today. This means greater costs associated with security but, until recently, there was very little data even on today's cost of security. The author recently was involved in conducting primary research that addresses this issue and shares the findings and a look at tactical approaches that can start to control those costs.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Quantifying and Lowering Security Costs - Hard Dollars\",\"authors\":\"Philip Carden\",\"doi\":\"10.1201/1086/43301.7.4.19990101/31016.5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Businesses today use the Internet primarily as a means of providing fast convenient access to public information. But, the potential business uses go much further. Electronic commerce, for example, significantly will lower the cost of dayto-day business transactions, and virtual private networks provide a lower-cost alternative to traditional data and even voice networks. However, these advanced uses of the Internet require a stronger security infrastructure than most companies have in place today. This means greater costs associated with security but, until recently, there was very little data even on today's cost of security. The author recently was involved in conducting primary research that addresses this issue and shares the findings and a look at tactical approaches that can start to control those costs.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086/43301.7.4.19990101/31016.5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43301.7.4.19990101/31016.5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Quantifying and Lowering Security Costs - Hard Dollars
Abstract Businesses today use the Internet primarily as a means of providing fast convenient access to public information. But, the potential business uses go much further. Electronic commerce, for example, significantly will lower the cost of dayto-day business transactions, and virtual private networks provide a lower-cost alternative to traditional data and even voice networks. However, these advanced uses of the Internet require a stronger security infrastructure than most companies have in place today. This means greater costs associated with security but, until recently, there was very little data even on today's cost of security. The author recently was involved in conducting primary research that addresses this issue and shares the findings and a look at tactical approaches that can start to control those costs.