首页> 外文OA文献 >CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS
【2h】

CONTROLS-BASED APPROACH FOR EVALUATION OF INFORMATION SECURITY STANDARDS IMPLEMENTATION COSTS

机译:基于控制信息安全标准实施成本的控制方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs.However, information security cost-benefits assessment is complicated, because of lack of structured cost-benefit methods and issues with comparing IT security solutions in light of prevailing uncertainties. Existing methods are oriented on processes, environment lifecycles or specific standard implementations. Because of that, existing methods do not cover all needed security areas and methods reusability is a complicated task. Trying to solve this issue, we have proposed a new method for information standards implementation costs evaluation, based on information security controls.
机译:根据普华永道的分析,2015年,单一信息安全和数据保护漏斗的平均成本增加了两次(普华永道2015年)。报告严重违约的组织数量也上升(从2015年的9%到2016年的17%)(普华永道2016年)。实现目标犯罪分子正在使用不同的技术,从社会工程(网络钓鱼,捕鲸)和目标机器上的恶意软件执行(如赎金软件)完成。最近的攻击(孟加拉国中央银行袭击,欺诈攻击Matter首席执行官和泰国国立政府银行ATM的攻击)展示,犯罪分子是非常合理的,装备和花费大量的金钱来准备他们的攻击。为了保护自己,需要确保深度原则中的安全性并实施复杂的安全解决方案,该解决方案能够以适当的成本确保所需的信息安全水平。但是,由于缺乏结构性的成本效益方法和问题,信息安全性成本效益评估是复杂的,因为鉴于普遍的不确定性,缺乏结构性的成本效益方法和问题。现有方法面向过程,环境生命周期或特定标准实现。因此,现有方法不涵盖所有所需的安全区域,方法可重用性是一个复杂的任务。试图解决这个问题,我们提出了一种新的信息标准实施成本评估方法,基于信息安全控制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号