The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Managing vulnerabilities of information systems to security incidents
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
Security in Computing (4th Edition)
Security in Computing (4th Edition)
Hi-index | 0.00 |
A model is developed for optimal resource allocation in terms of countermeasures to protect an enterprise information infrastructure. The model divides the information infrastructure into four parts: network, email, remote access and mobile computing. An economic model is developed and used to formulate an associated optimization problem which is then solved as a linear program to determine the optimal resource allocation.