Security attribute evaluation method a cost-benefit approach
Conducting cost-benefit analyses of architectural attributes such as security has always been difficult, because the benefits are difficult to assess. Specialists usually make security decisions, but program managers are left wondering whether their investment in security is well spent. This paper s...
Saved in:
Published in | Proceedings - International Conference on Software Engineering pp. 232 - 240 |
---|---|
Main Author | |
Format | Conference Proceeding Journal Article |
Language | English |
Published |
New York, NY, USA
ACM
01.01.2002
|
Series | ACM Conferences |
Subjects |
Social and professional topics
> Professional topics
> Management of computing and information systems
> Implementation management
> Pricing and resource allocation
Social and professional topics
> Professional topics
> Management of computing and information systems
> Project and people management
|
Online Access | Get full text |
ISBN | 158113472X 9781581134728 |
ISSN | 0270-5257 |
DOI | 10.1145/581339.581370 |
Cover
Summary: | Conducting cost-benefit analyses of architectural attributes such as security has always been difficult, because the benefits are difficult to assess. Specialists usually make security decisions, but program managers are left wondering whether their investment in security is well spent. This paper summarizes the results of using a cost-benefit analysis method called SAEM to compare alternative security designs in a financial and accounting information system. The case study presented in this paper starts with a multi-attribute risk assessment that results in a prioritized list of risks. Security specialists estimate countermeasure benefits and how the organization's risks are reduced. Using SAEM, security design alternatives are compared with the organization's current selection of security technologies to see if a more cost-effective solution is possible. The goal of using SAEM is to help information-system stakeholders decide whether their security investment is consistent with the expected risks. |
---|---|
Bibliography: | SourceType-Scholarly Journals-2 ObjectType-Feature-2 ObjectType-Conference Paper-1 content type line 23 SourceType-Conference Papers & Proceedings-1 ObjectType-Article-3 content type line 25 |
ISBN: | 158113472X 9781581134728 |
ISSN: | 0270-5257 |
DOI: | 10.1145/581339.581370 |