考虑预算约束和攻击者偏好的信息安全投资策略研究

Chongxia Pan
{"title":"考虑预算约束和攻击者偏好的信息安全投资策略研究","authors":"Chongxia Pan","doi":"10.1145/3573834.3574573","DOIUrl":null,"url":null,"abstract":"Information security investment is the basis to ensure the stable operation of information systems. By adopting expected utility theory, the paper studies the influences of budget constraints, attacker preferences, attack types and other factors on firm information security investment strategies. The results show, under a certain budget constraint, when opportunistic attackers prefer to select attack targets from the system vulnerability and targeted attackers prefer to select attack targets from the value of information assets, the optimal information security investment of a firm has a minimum value and the minimum value increases with the security investment efficiency of defending against targeted attacks. When the network exposure is small, investment on defending against targeted attack decreases with the network exposure. When the network exposure is relatively large, security investment on defending against targeted attack increases with the network exposure, and security investment on defending against opportunistic attack decreases with the network exposure.","PeriodicalId":345434,"journal":{"name":"Proceedings of the 4th International Conference on Advanced Information Science and System","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on the Information Security Investment Strategies Considering Budget Constraints and the Attacker's Preferences\",\"authors\":\"Chongxia Pan\",\"doi\":\"10.1145/3573834.3574573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security investment is the basis to ensure the stable operation of information systems. By adopting expected utility theory, the paper studies the influences of budget constraints, attacker preferences, attack types and other factors on firm information security investment strategies. The results show, under a certain budget constraint, when opportunistic attackers prefer to select attack targets from the system vulnerability and targeted attackers prefer to select attack targets from the value of information assets, the optimal information security investment of a firm has a minimum value and the minimum value increases with the security investment efficiency of defending against targeted attacks. When the network exposure is small, investment on defending against targeted attack decreases with the network exposure. When the network exposure is relatively large, security investment on defending against targeted attack increases with the network exposure, and security investment on defending against opportunistic attack decreases with the network exposure.\",\"PeriodicalId\":345434,\"journal\":{\"name\":\"Proceedings of the 4th International Conference on Advanced Information Science and System\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th International Conference on Advanced Information Science and System\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3573834.3574573\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Advanced Information Science and System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3573834.3574573","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

信息安全投资是保证信息系统稳定运行的基础。本文运用期望效用理论,研究了预算约束、攻击者偏好、攻击类型等因素对企业信息安全投资策略的影响。结果表明,在一定的预算约束下,当机会攻击者更倾向于从系统漏洞中选择攻击目标,而目标攻击者更倾向于从信息资产价值中选择攻击目标时,企业的最优信息安全投资存在一个最小值,且最小值随着防范目标攻击的安全投资效率的增加而增加。当网络暴露量较小时,防御针对性攻击的投入随着网络暴露量的增加而减少。当网络暴露量较大时,防范针对性攻击的安全投资随着网络暴露量的增加而增加,防范机会攻击的安全投资随着网络暴露量的增加而减少。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research on the Information Security Investment Strategies Considering Budget Constraints and the Attacker's Preferences
Information security investment is the basis to ensure the stable operation of information systems. By adopting expected utility theory, the paper studies the influences of budget constraints, attacker preferences, attack types and other factors on firm information security investment strategies. The results show, under a certain budget constraint, when opportunistic attackers prefer to select attack targets from the system vulnerability and targeted attackers prefer to select attack targets from the value of information assets, the optimal information security investment of a firm has a minimum value and the minimum value increases with the security investment efficiency of defending against targeted attacks. When the network exposure is small, investment on defending against targeted attack decreases with the network exposure. When the network exposure is relatively large, security investment on defending against targeted attack increases with the network exposure, and security investment on defending against opportunistic attack decreases with the network exposure.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信