Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 30.38
Topic:

ITM517 MOD4: Economic Considerations & Information Security

Case Study Instructions:

Module 4 - Case
Security via Technology
Case Assignment
I. Revisit Bruce Schneier's presentation in Module 2. This time, please focus on his discussions on cost/benefit analysis.
Schneier, B. (2008). What are the implications of spying? CCTV interview with Bruce Schneier. Retrieved from https://www(dot)youtube(dot)com/watch?v=Ar67N94NYr0
If you don't have access to the presentation, then simply read his article mentioned in Module 2. The article is:
Schneier, Bruce. The Psychology of Security. http://www(dot)schneier(dot)com/essay-155.html
The following article provides an example how such a cost/benefit analysis is considered.
Schneier, Bruce. Security at What Cost? National ID System Is Not Worth The $23 Billion Price Tag. http://www(dot)schneier(dot)com/essay-207.html.
The following article uses some typical accounting measurements for economics of information security.
Gordon, L. A., & Richardson, R. (2004). The New Economics of Information Security. Optimize. April 2004. p83-867 (Trident library)
The following article recaps what we talked about perceptions of security. More importantly, it discusses how people generally do not perceive gains and costs equally. When you conduct a cost/benefit analysis of security, you should keep that in mind.
West, Ryan (2008). The Psychology of Security. Communications of the ACM, Apr2008, Vol. 51 Issue 4. pp34-40.
II. Incentive Design
The economics of information security is not only about cost/benefit analysis of implementing a security measure. Another major topic in economics is mechanism design, which provides principles and methods (like game theory) to help design incentive-compatible mechanisms that ensure participants are better off behaving honestly than dishonestly. See the following article to get a peek:
The Economist. (2007) Intelligent Design. Oct 18th, 2007. http://www(dot)economist(dot)com/finance/displaystory.cfm?story_id=9988840
To know more about the three Nobel Prize winners in 2007 economics division, surf http://nobelprize(dot)org/nobel_prizes/economics/laureates/2007/ and check them out.
It is not easy to understand the revelation principle or the incentive-compatible design. I introduce you the concepts here for the purpose of making you aware of such a method. It takes time to learn how to design a game (a mechanism) that every party is better off by being honest.
Well, on a lighter note. Interestingly, a movie called "Mad Money" tells a story of three female employees of the Federal Reserve Bank stealing money that is about to be shredded. It is not a movie that I recommend to watch a second time, but it is entertaining enough to watch once. The movie is also a fit for the educational purpose here. I suggest you watch it once when you get a chance during this term, and pay special attention to the human factors -- especially the incentives of the thieves and the Chief Security Officer.
III. Other Economics Issues as to Security
As a matter of fact, there are many aspects in applying economics to information security. The following article has mentioned a list of authors that research economics of information security and provided a brief overview of their research:
Anderson R. and Schneier B., (2005) Economics of Information Security, IEEE Security and Privacy 3 (1), 2005, pp. 12-13. (Retrieved May 19, 2008).
To know more in depth, you can choose to view the video (optional):
Simonyi Konferencia 2011 - Economics of Information Security and Privacy. Retrieved from http://www(dot)youtube(dot)com/watch?v=fSfH80DY6S4
You are probably overwhelmed now with all these economics. I hope you also have broadened your views on security and have said "wow" to yourself that now you hold a much broader view on security and how to approach it from economic perspective.
Please write a 4- to 6-page paper discussing what you have learned:
What are the economic considerations of information security and its management?
In preparing your paper, you need to discuss the following issues, and support with arguments and evidence:
· What are the major economic considerations in information security and management?
· Are these economic considerations serving their purposes?
· Why do these economic measures help?
· Discuss economic mechanisms that can improve information security and management.
· Provide a comparative table of the economic measures that you discussed. 
Assignment Expectations
Length: Minimum 4–6 pages excluding cover page and references (since a page is about 300 words, this is approximately 1,200–1,800 words).
Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.
Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.
Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.
Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.
Citing sources (3 points): Uses in-text citations and properly formats references in APA style.
· Please use original writing (No Plagerism)
· Please use American URLs than can be easily verified on the web on the reference page.
· Please include the page numbers in the references
· Read then background material in the attachment titled Background

Case Study Sample Content Preview:
Economic considerations of information security and its management
Student:
Professor:
Course title:
Date:
Economic considerations of information security and its management
Information security, which is understood as the protection of computer systems as well as the availability, confidentiality and integrity of the data they contain, is a critical issue. This paper provides an exhaustive discussion of the economic considerations of information security (IS) and its management. The paper indicates whether these economic considerations are actually serving their purposes. Furthermore, the significance of these economic measures is described and the economic mechanisms which could improve information security and management are discussed. A comparative table of the economic measures which are discussed is provided.
Economic considerations in Information Security and management
How much is spent on Information Security and Management
In information/computer security, one of the basic things to take into account is determining how much the organization is spending on information security and management. In general, the company needs to make sure that an adequate amount of money is spent on security and management. For instance, the management should ensure that it spends sufficient money on keeping hackers and cyber thieves out of the company’s computer systems (Schneier, 2014). In essence, the company should not spend too much or too little amount of money on securing its computer systems.
Are security budgets being spent on the right things
Another important economic consideration is that the company should ensure that it is actually spending its security budgets appropriately and on the right things. For instance, the management of the company should make sure that the company is actually spending its security budgets on things such as access control; encryption for instance E-mail encryption; and installing firewalls in protecting information (West, 2008).
Monetary loss in case of a breach
The financial loss to the business organization as a result of an infringement of security of the information system is also a vital economic consideration of information security and its management. It is notable that this loss could be because of a security infringement relating to: (i) denial of services for instance loss because of missed sales from certified users that were deprived of rightful access. (ii) Integrity for instance the loss as a result of the company making wrong decisions founded on data that has been altered by intruders; or (iii) confidentiality, for instance the loss because of the fraudulent usage of credit card information by cyber thieves and hackers or the firm’s strategic information becoming obtainable to its competitors (Anderson & Schneier, 2005).
Costs / benefits analysis
Consider the following situation: assuming that the only security problem faced by a company’s information systems is virus. Also assume that the sole solution to this problem is anti-virus. If the company’s information system is not protected, the expected yearly loss is $90,000. Bearing in mind the uncertainty behind virus attacks, it is possible that the company can spend c...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Case Study Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!