INV Flashcards

1
Q

Security Decisions are Investment Decisions

A
  • Estimating payoff is difficult (non-linear, interactions)
  • Redundancy as an example

Greater security investments do not necessarily translate to improvements in information security and smaller likelihoods of security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Return on Security Investment RoSI

A

RoSI indicates the relationship between costs and benefits of a security investment and thus shows if or when information security investments lead to a Return on Investment (RoI)

R Recovery costs

S Savings

T Tools

ALE Annual Loss Expenditure (residual costs after investment)

ALE = R - S + T

RoSI = R - ALE

R-(R-S+T) = RoSI

RoSI = S - T

relies on precise monetary values therefore problematic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Effectiveness of Security Investments

A

Paradox: organizations allocate increasingly higher budgets for IT security but, at the same time, data breach incidents have become more frequent and severe,

Hypothesis: organization vary with respect to ho well they integrate security into their practices. Symbolic and substantive investment reflects the degree to which an organization’s activities are correctly reflected in the signals they communicate.

symbolic inv. :
-Window dressing (signaling compliance)
-But no real technical benefit as the main goal)
- e.g. investing in an outdated security technology
I
v
Ineffective in preventing data breaches

substantive investment
-Communicated signals represent adopted practices
-benefits from technology as the main goal
-e.g. full integration of a security technology into the entire IT landscape
I
v
Effective In preventing data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Effectiveness of Security Investments

A

Kwon and Johnson distinguish between

proactive and reactive security investments

Proactive:

  • Made before an incident occurs
  • Active investment decision: how and where to invest

Reactive Investment

  • After an incident has occurred
  • Past oriented investment depending on the incident

their study shows that proactive investments are more effective, lead to fewer security failures and less severe breaches with less affected individuals than reactive investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Security Outsourcing

A

comissioning a managed security service provider with information security protection

Benefits:

  • cost savings
  • focus on core business (Kodak) vs (Netflix)
  • expertise from others
  • increased flexibility (avoid fixcosts)
  • follow the sun principle (minimize impact because 24H working)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Outsourcing risks

A
  • Loss of expertise (people leave and hire new people without security knowledge)
  • Increasing dependency on managed security service provider (More costly if one wants to switch)
  • Distance (cultural distance, avoiding nos)
  • Resistance among employees and labor law issues
  • Multi client nature of the provider can lead to homogenization of security systems (one client’s security brach can spill over to other clients)
  • shared liability, asymmetric information, and lack of control opportunities create double moral hazard problem (both sides fail to invest adequately in security because no-one wants to be responsible)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud computing and Information security

A

is a model for enabling ubiquitous convenient on demand network access to a shared pool pf computing resources that can be rapidly provisioned and released with minimal management effort or. service provider interaction

three levels:

  • SaaS (aplication software office 365)
  • PaaS (Platform resources force.com)
  • IaaS (AWS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pros and Cons of Cloud Computing

A

+

  • > cost savings
  • > speed of implementation
  • > flexibility (Increase space for temporarily need)
  • > automatic updates (provider takes care)

-

  • > potential cloud related vulnerabilities (internet as channel of attack)
  • > different legal jurisdiction (different jurisdiction)
  • > subcontracting (giving up control over my data)

Risk assessment, safeguards, back ups, hq location, support, location of data storage, process of dealing with security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly