Comparison of the Most Important Models of Investments in Cyber and Information Security

dc.contributor.authorPodešva, Lukáš
dc.contributor.authorKoch, Miloš
dc.coverage.issue39cs
dc.coverage.volumeXVIcs
dc.date.accessioned2022-07-08T13:12:00Z
dc.date.available2022-07-08T13:12:00Z
dc.date.issued2022-06cs
dc.description.abstractPurpose of the article: Cyber security has become a key factor in determining the success or failure of companies that rely on information systems. However, this entails considerable investment. Typical investments in information technology aim to create value, while investments in cyber security aim to minimise losses caused by cyber-attacks. In the case of investment in cyber and information security, therefore, we must evaluate the amount of loss that will never actually occur. This is a complicated problem, and several approaches have been proposed over the years to estimate the cost-benefit balance of security investments. Methodology/methods: This paper is based on previous research (Podešva et al., 2021), where two most used methods of the ROI / ROSI (Bojanc, 2008) and Gordon-Loe model (Gordon, Loeb, 2002) were identified in the field of investments in cyber and information security. Both methods are described and the advantages and limitations for further research are identified. Scientific aim: The main goal is to select the most suitable method for further research in the field of investment in cyber and information security. Findings: ROI / ROSI does not seem suitable for further research because it only tells us what percentage of return on in-vestment will be provided during a given period. The separate use of this method (ROI / ROSI) provides us with very limited results and it is necessary to combine it with other methods. On the other hand, the Gordon-Loeb model is much more complex despite several limitations, especially for coefficients ʎ and t. Further research will therefore focus on the constant t (probability of attack on a given information set) and its value will be modelled based on the SIR epidemic model on network with standard incidents (Podešva, Koch 2019). Conclusions: At present, there is no standardised approach to decision-making and the size of investments in cyber and in-formation security. This is a very complex issue, and it is very difficult to find one universal model. Nevertheless, there are several models that help in this decision-making process, and as the most appropriate method for further research is GordonLoe model.en
dc.formattextcs
dc.format.extent25-34cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationTrendy ekonomiky a managementu. 2022, XVI, č. 39, s. 25-34. ISSN 1802-8527.cs
dc.identifier.doi10.13164/trends.2022.39.24cs
dc.identifier.issn1802-8527
dc.identifier.urihttp://hdl.handle.net/11012/208162
dc.language.isoencs
dc.publisherVysoké učení technické v Brně, Fakulta podnikatelskács
dc.relation.ispartofTrendy ekonomiky a managementucs
dc.relation.urihttps://trends.fbm.vutbr.cz/index.php/trends/article/view/621cs
dc.rightsCreative Commons Attribution 4.0 International licensecs
dc.rights.accessopenAccessen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.subjectReturn on investmenten
dc.subjectReturn on security investmenten
dc.subjectROIen
dc.subjectROSIen
dc.subjectGordon – Loeb Modelen
dc.subjectInvesctmenten
dc.subjectInfor-mation securityen
dc.subjectCyber securityen
dc.subjectReturn on investmenten
dc.subjectReturn on security investmenten
dc.subjectROIen
dc.subjectROSIen
dc.subjectGordon – Loeb Modelen
dc.subjectInvestmenten
dc.subjectInformation securityen
dc.subjectCyber securityen
dc.titleComparison of the Most Important Models of Investments in Cyber and Information Securityen
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.facultyFakulta podnikatelskács
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
trendy-2022-01-39-621-podesva.pdf
Size:
562.38 KB
Format:
Adobe Portable Document Format
Description: