메뉴 건너뛰기




Volumn 38, Issue 1, 2006, Pages 45-56

Return on security investment (ROSI) - A practical quantitative model

Author keywords

Algorithms; Benchmarking; Economics; Management; Measurement; Return on Security Investment; Security metrics; Security strategy; Standardization

Indexed keywords

RETURN ON SECURITY INVESTMENT; SECURITY METRICS; SECURITY STRATEGY; TECHNOLOGY IMPLEMENTERS;

EID: 33644693734     PISSN: 1443458X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (149)

References (18)
  • 2
    • 84888803067 scopus 로고    scopus 로고
    • Calculated risk
    • December
    • BERINATO, S. (2002): Calculated Risk, CSO Magazine, December. See: www.csoonline.com/read/120902/calculate.html
    • (2002) CSO Magazine
    • Berinato, S.1
  • 3
    • 33644696603 scopus 로고    scopus 로고
    • Executives need to know: The arguments to include in a benefits justification for increased cyber security spending
    • Auerbach Publications, September/October
    • BRAITHWAITE, T. (2001): Executives need to know: The arguments to include in a benefits justification for increased cyber security spending. In Information Systems Security, Auerbach Publications, September/October.
    • (2001) Information Systems Security
    • Braithwaite, T.1
  • 5
    • 84888788474 scopus 로고    scopus 로고
    • COMPUTER WORLD ROI KNOWLEDGE CENTRE: See: www.computerworld.com/managementtopics/roi
  • 6
    • 0012208471 scopus 로고    scopus 로고
    • Finally, a real return on security spending
    • February
    • FINALLY, A REAL RETURN ON SECURITY SPENDING (2002): CIO Magazine, February; See: www.cio.com/archive/021502/security.html.
    • (2002) CIO Magazine
  • 8
    • 78651427965 scopus 로고    scopus 로고
    • INFORMATION SECURITY FORUM: Standard of good practice, See: http://www.isfsecuritystandard.com/index_ns.htm
    • Standard of Good Practice
  • 11
    • 33644691377 scopus 로고    scopus 로고
    • June
    • NSW GOVERNMENT OFFICE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (2003): Information security guideline, June. See: http://www.oict.nsw.gov.au/
    • (2003) Information Security Guideline
  • 12
    • 33644687760 scopus 로고    scopus 로고
    • Published by the American College of Physicians' Effective Clinical Practice, September/October
    • PRIMER ON COST-EFFECTIVENESS ANALYSIS (2000): Published by the American College of Physicians' Effective Clinical Practice, September/October. See: www.acponline.org/journals/ecp/sepoct00/primer.htm
    • (2000) Primer on Cost-effectiveness Analysis
  • 13
  • 14
    • 84888795672 scopus 로고    scopus 로고
    • Security metrics guide for information technology systems special
    • Publication 800-55
    • SECURITY METRICS GUIDE FOR INFORMATION TECHNOLOGY SYSTEMS SPECIAL (2002): Publication 800-55 US National Institute of Standards and Technology Computer Security Research Centre. See: csrc.nist.gov/publications/nistpubs/800-55/sp800-55.pdf.
    • (2002) US National Institute of Standards and Technology Computer Security Research Centre
  • 16
    • 84888776860 scopus 로고    scopus 로고
    • THE RETURN ON INVESTMENT FOR INFORMATION SECURITY (2001): See: http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ networking_solutions_audience_business_benefit09186a008010e490.html
    • (2001) The Return on Investment for Information Security
  • 18
    • 2142852379 scopus 로고    scopus 로고
    • Cost-benefit analysis for network intrusion detection systems
    • Centre for Secure and Dependable Software, University of Idaho
    • WEI, H., FRINKE, D., et al (2001): Cost-benefit analysis for network intrusion detection systems. Centre for Secure and Dependable Software, University of Idaho. In Proceedings of the 28th Annual Computer Security Conference October. See: wwwcsif.cs.ucdavis.edu/~balepin/new_pubs/costbenefit.pdf
    • (2001) Proceedings of the 28th Annual Computer Security Conference October
    • Wei, H.1    Frinke, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.