34,756 research outputs found
From Lemons to Peaches: Improving Security ROI through Security Chaos Engineering
Traditional information security presents a poor ROI: payoffs only manifest
when attacks are successfully prevented. In a reality where attacks are
inevitable, subpar returns are therefore inevitable. The emerging paradigm of
Security Chaos Engineering offers a more remunerative and reliable ROI by
minimizing attack impacts and generating valuable evidence to inform continuous
improvement of system design and operation.Comment: 2022 IEEE Secure Development Conference (SecDev
A Framework for Understanding, Prioritizing, and Applying Systems Security Engineering Processes, Activities, and Tasks
Current systems security practices lack an effective approach to prioritize and tailor systems security efforts to develop and field secure systems in challenging operational environments, which results in business and mission stakeholders becoming more susceptible to an array of disruptive events. This work informs Systems Engineers on recent developments in the field of system security engineering and provides a framework for more fully understanding the application of Systems Security Engineering (SSE) processes, activities, and tasks as described in the recently released National Institute of Standards and Technology (NIST) Special Publication 800-160. This SSE framework uniquely offers a repeatable and tailorable methodology that allows system developers to focus on high Return-on-Investment (RoI) SSE processes, activities, and tasks to more efficiently meet stakeholder protection needs and deliver trustworthy secure systems
Web development evolution: the business perspective on security
Protection of data, information, and knowledge is a hot topic in todayās business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and defend accountability. Research indicates that a significant portion of the financial losses is due to straight forward software design errors. Security should be addressed throughout the application development process via an independent methodology containing customizable components. The methodology is designed to integrate with an organizationās existing software development processes while providing structure to implement secure applications, helping companies mitigate hard and soft costs
An Overview of Economic Approaches to Information Security Management
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security. As a result, senior managers in many organizations are now expressing a much greater interest in information security. However, the largest body of research related to preventing breaches is technical, focusing on such issues as encryption and access control. In contrast, research related to the economic aspects of information security is small but rapidly growing. The goal of this technical note is twofold: i) to provide the reader with an structured overview of the economic approaches to information security and ii) to identify potential research directions
- ā¦