Effective security safeguard selection process for return on security investment

Hoon Kim Do, Lee Taek, Peter In Hoh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Over the past few years, a considerable number of studies have been made on the Return on Security Investment (ROSI) in connection with security policy. However, it is necessary to quantity types of projected damages, cyber threats, security safeguards and ROSI, since the size of information system and its investment factors are growing continuously. Accordingly, in this paper, we propose a way of effective security investment for a higher ROSI, focusing on how to efficiently conduct assessment with use of the Analytic Hierarchy Process (AHP)-based Canonical Correlation Analysis (CCA). The CCA is a means of measuring the linear relationship between relevant cyber threats and corresponding security-safeguarding methods. Finally, we illustrate how such analyses can be used for determination of which securitysafeguarding method functions most efficiently, as alternative to the current security investment policy.

Original languageEnglish
Title of host publicationProceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008
PublisherIEEE Computer Society
Pages668-673
Number of pages6
ISBN (Print)9780769534732
DOIs
Publication statusPublished - 2008
Event3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008 - Yilan, Taiwan, Province of China
Duration: 2008 Dec 92008 Dec 12

Publication series

NameProceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008

Conference

Conference3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008
Country/TerritoryTaiwan, Province of China
CityYilan
Period08/12/908/12/12

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Effective security safeguard selection process for return on security investment'. Together they form a unique fingerprint.

Cite this