Posted by:
admin
15 years, 11 months ago
I have just finished reading Gordon &Loeb's Managing Cybersecurity Resources: A Cost-Benefit Analysis and I highly recommend it for information security professionals seeking to learn more about the economics of information security.
The book goes into some good details about using Average Loss Expectancy. The most interesting part for me was there discussion of their financial model. While disappointed that they felt the "mathematical approach to deriving the optimal investment level" was beyond the scope of the book, I thought the presented results were interesting:
First, it is generally uneconomical to invest in cybersecurity activities costing more thatn 37 percent of the expected loss. In fact, in most cases, an organization would want to invest an amount substantially below the 1/3 rule.The authors state the this is the rule of dominishing returns at work. I wonder if other forces are at work too. For example, two-factor authentication has traditionally been very expensive. Now attacks against passwords are more prevelent and profitable, so the potential costs have increased, making it more likely that deploying two-factor authentication will fit in the 1/3 rule. At the same time, competition from start-ups like WiKID have help reduce the cost of two-factor authentication. When we price our solution, we take into consideration the competition's pricing, but mainly what our target market is willing to pay, which may be 1/3 of the expected loss. Without more details of their model, it is hard to know which is the dog and which the tail.
The second result (an information set is that data which is being protected):
Even for imformation sets that have the same potential loss from a security breach and face the same threats, organizations should not always direct their cybersecurity investments toward those information sets having the greatest vulnerabilty.This just means that some information sets are too costly to protect effectively, which makes sense, but seems to separate out protected data from the protection mechanism, which is hard to do. What data is your firewall protecting?
There is a lot more in the book that I hope to have time to go into, but I wouldn't count on it, so you might want to get it yourself ;).
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)