Analyzing Risks to Determine a New Return on Security Investment

Author(s):  
Warren Axelrod

This chapter expands upon standard methods of calculating the return on security investment (ROSI) in several ways. First, it accounts for the dynamic nature of threats, vulnerabilities, and defenses as they apply to the finance sector. Second, it takes a more holistic view of security investments using a portfolio method. The protection of information assets can be viewed in two ways. One is the hierarchical view of security measures, such as avoidance, deterrence, and prevention. The other is defense in depth, wherein various security tools and processes, such as firewalls, identity and access management, and intrusion detection and prevention products, are combined for greater overall protection. The reader will gain a deeper understanding of the factors that affect the risks and returns of investments in security measures, tools, and processes and will find that using the portfolio approach leads to more cost-effective security.

2012 ◽  
Vol 1 (1) ◽  
pp. 12-28 ◽  
Author(s):  
Tridib Bandyopadhyay

Using Internet-based technologies to establish network connectivity between firms can create conduit for propagation of threat vectors. Sharing data and information assets with other firms may give rise to external seats of loss exposure. Together, these practices complicate the IT security risk in business relationship: misaligned incentive for IT security investment and free rider behavior arise. Naïve pursuit to enter into business relationships using Internet-based technologies can prove myopic because the IT security risk profile of the resultant B2B network may be untenable. This research exhibits the impact of sharing and linking of information and network assets on IT security risk in modern business relationship with the help of a 2-firm symmetric B2B. This work demonstrates why managers should consider expanding their business relationship to include IT security initiatives as well, especially when they employ Internet-based technologies to interlink their networks.


2020 ◽  
pp. 1192-1198
Author(s):  
M.S. Mohammad ◽  
Tibebe Tesfaye ◽  
Kim Ki-Seong

Ultrasonic thickness gauges are easy to operate and reliable, and can be used to measure a wide range of thicknesses and inspect all engineering materials. Supplementing the simple ultrasonic thickness gauges that present results in either a digital readout or as an A-scan with systems that enable correlating the measured values to their positions on the inspected surface to produce a two-dimensional (2D) thickness representation can extend their benefits and provide a cost-effective alternative to expensive advanced C-scan machines. In previous work, the authors introduced a system for the positioning and mapping of the values measured by the ultrasonic thickness gauges and flaw detectors (Tesfaye et al. 2019). The system is an alternative to the systems that use mechanical scanners, encoders, and sophisticated UT machines. It used a camera to record the probe’s movement and a projected laser grid obtained by a laser pattern generator to locate the probe on the inspected surface. In this paper, a novel system is proposed to be applied to flat surfaces, in addition to overcoming the other limitations posed due to the use of the laser projection. The proposed system uses two video cameras, one to monitor the probe’s movement on the inspected surface and the other to capture the corresponding digital readout of the thickness gauge. The acquired images of the probe’s position and thickness gauge readout are processed to plot the measured data in a 2D color-coded map. The system is meant to be simpler and more effective than the previous development.


2016 ◽  
Vol 2 (3) ◽  
pp. 528
Author(s):  
Ako Abubakr Jaffar ◽  
Mazen Ismaeel Ghareb ◽  
Karzan Hussein Sharif

The Retailers all over the world are prospering from the burgeoning trend of online shopping. Kurdistan Regional Government is still struggling to grow its e-commerce markets. On the other hands e-commerce in Various countries in the Middle East have some of the world’s highest internet and mobile penetration rates. Alternative payments methods are quickly expanding, and having access to some of the world’s most coveted natural resources that allows countries in their region to have some of the highest GDP in the world. There are several challenges prevalent in the KRG Region market that will require international merchants to develop strategies based on innovation and vigilance. This unique region is plagued with complications many other countries have little to no experience with e-commerce, which highlights the need for retailers to have a deep understanding as to how this region operates before they can begin finding solutions. One of the biggest concerns today's consumers have is the risk of fraud when they are shopping online. With highly sophisticated malware and perceptive cybercriminals, customers' card and bank information can easily be stolen if a merchant does not take the proper security measures. In this paper we summarize all challenges need to be addressed in KRG in order to make correct steps to apply e-commerce in KRG. Finally, the recommendations and framework are proposed for e-commerce to encourage government, organizations, and people to take advantages from e-commerce.


2020 ◽  
Vol 9 (1) ◽  
pp. 67
Author(s):  
Seung-Min Yang ◽  
Jiwon Baek ◽  
Eiseul Kim ◽  
Hyeon-Be Kim ◽  
Seyoung Ko ◽  
...  

In recent years, Salmonella Infantis has become a predominant serovariant in clinical and poultry isolates, thereby imposing a substantial economic burden on both public health and the livestock industry. With the aim of coping with the steep increase in serovar Infantis prevalence, a polymerase chain reaction (PCR)-based rapid and accurate diagnostic assay was developed in this study through pangenome profiling of 60 Salmonella serovars. A gene marker, SIN_02055, was identified, which is present in the S. Infantis genome but not in the pangenome of the other serovars. Primers specific to SIN_02055 were used to accurately detect serovar Infantis, and to successfully differentiate Infantis from the other 59 serovars in real-time PCR with a R2 of 0.999 and an efficiency of 95.76%. The developed method was applied to 54 Salmonella strains belonging to eight dominant serovars, and distinguished Infantis from the other seven serovars with an accuracy of 100%. The diagnostic primer set also did not show false positive amplification with 32 strains from eight non-Salmonella bacterial species. This cost-effective and rapid method can be considered an alternative to the classic serotyping using antisera.


2009 ◽  
Vol 78 (3) ◽  
pp. 1383-1389 ◽  
Author(s):  
Gabriella M. Scandurra ◽  
Geoffrey W. de Lisle ◽  
Sonia M. Cavaignac ◽  
May Young ◽  
R. Pamela Kawakami ◽  
...  

ABSTRACT Mycobacterium avium subsp. paratuberculosis (basonym M. paratuberculosis) is the causative agent of paratuberculosis, a chronic enteritis of ruminants. To control the considerable economic effect that paratuberculosis has on the livestock industry, a vaccine that induces protection with minimal side effects is required. We employed transposon mutagenesis and allelic exchange to develop three potential vaccine candidates, which were then tested for virulence with macrophages, mice, and goats. All three models identified the WAg906 mutant as being the most attenuated, but some differences in the levels of attenuation were evident among the models when testing the other strains. In a preliminary mouse vaccine experiment, limited protection was induced by WAg915, as evidenced by a reduced bacterial load in spleens and livers 12 weeks following intraperitoneal challenge with M. paratuberculosis K10. While we found macrophages and murine models to be rapid and cost-effective alternatives for the initial screening of M. paratuberculosis mutants for attenuation, it appears necessary to do the definitive assessment of attenuation with a ruminant model.


2021 ◽  
Vol 39 (15_suppl) ◽  
pp. 8043-8043
Author(s):  
Mavis Obeng-Kusi ◽  
Daniel Arku ◽  
Neda Alrawashdh ◽  
Briana Choi ◽  
Nimer S. Alkhatib ◽  
...  

8043 Background: IXA, CAR, ELO and DARin combination with LEN+DEXhave been found superior in efficacy compared to LEN+DEX in the management of R/R MM. Applying indirect treatment comparisons from a network meta-analysis (NMA), this economic evaluation aimed to estimate the comparative cost-effectiveness and cost-utility of these four triplet regimens in terms of progression-free survival (PFS). Methods: In the absence of direct treatment comparison from a single clinical trial, NMA was used to indirectly estimate the comparative PFS benefit of each regimen. A 2-state Markov model simulating the health outcomes and costs was used to evaluate PFS life years (LY) and quality-adjusted life years (QALY) with the triplet regimens over LEN+DEX and expressed as the incremental cost-effectiveness (ICER) and cost-utility ratios (ICUR). Probability sensitivity analyses were conducted to assess the influence of parameter uncertainty on the model. Results: The NMA revealed that DAR+LEN+DEX was superior to the other triplet therapies, which did not differ statistically amongst them. As detailed in the Table, in our cost-effectiveness analysis, all 4 triplet regimens were associated with increased PFSLY and PFSQALY gained (g) over LEN+DEX at an additional cost. DAR+LEN+DEX emerged the most cost-effective with ICER and ICUR of $667,652/PFSLYg and $813,322/PFSQALYg, respectively. The highest probability of cost-effectiveness occurred at a willingness-to-pay threshold of $1,040,000/QALYg. Conclusions: Our economic analysis shows that all the triplet regimens were more expensive than LEN +DEX only but were also more effective with respect to PFSLY and PFSQALY gained. Relative to the other regimens, the daratumumab regimen was the most cost-effective.[Table: see text]


Author(s):  
Sheila Menon FBSCH ◽  
Vidya Bhagat

The COVID-19 pandemic has had a significant impact on the psychosocial factors that effect people globally. Particularly affected are children, students and health workers and the common symptoms identified are stress, anxiety disorders, depression and post-traumatic stress disorder. In addition, the various security measures implemented to ensure public safety have adversely affected relationships between people. This study directs public awareness to the value of psychotherapeutic support. Tele-therapy can be offered easily to people both at home or in the workplace, providing both cost effective and time sensitive solutions during times of crisis. The current review article provides an overview of the importance of maintaining psychological well-being during a pandemic and the identifies the role that empathetic communication has on wellbeing. The literature review was completed using electronic databases such as PubMed, Medline, and Scopus databases using the keywords covid-19, affected groups, affected relationships, psychology and its technological interventions, negative effects of pandemic so on.


2009 ◽  
Vol 1 (2) ◽  
pp. 45-60 ◽  
Author(s):  
Janusz Zawiła-Niedźwiecki ◽  
Maciej Byczkowski

Information Security Aspect of Operational Risk ManagementImproving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management


2013 ◽  
Vol 7 (3) ◽  
pp. 664-669
Author(s):  
Dejan Georgiev ◽  
Aristotel Tentov

In this paper we present logical circuits for efficient detection of rolled out contents. As network speed increases and security matters  there is a demand for implementation of hardware based Network Intrusion Detection and Prevention Systems (NIDPS). On the other hand hardware based NIDPS are lacking the flexibility of detection of so named "evasion" techniques. Here we present simple but efficient enhancement to content matching in hardware with minimal basic memory elements (flip-flops) used.


Sign in / Sign up

Export Citation Format

Share Document