Risk Management and Investment: Difference between revisions
No edit summary |
No edit summary |
||
Line 10: | Line 10: | ||
Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | Camp, L. Jean and Wolfram, Catherine (2004) [[Pricing Security]] | ||
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]] | Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) [[Research Agenda for the Banking and Finance Sector]] | ||
Line 42: | Line 40: | ||
|- | |- | ||
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | |Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A | ||
|- | |||
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf''] | |||
|- | |- | ||
|Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf ''Pdf''] | |Department of Defense||||2007||[[Mission Impact of Foreign Influence on DoD Software]]||Government Report||Low:Defense Policy/Procurement||[http://www.cyber.st.dhs.gov/docs/Defense%20Science%20Board%20Task%20Force%20-%20Report%20on%20Mission%20Impact%20of%20Foreign%20Influence%20on%20DoD%20Software%20(2007).pdf ''Pdf''] |
Revision as of 11:13, 11 August 2010
TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment
Anderson, Ross (2001) Why Information Security is Hard
Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security
Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure
Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing
Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security
Financial Services Sector Coordinating Council for Critical Infrastructure Protection (2008) Research Agenda for the Banking and Finance Sector
Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Institute for Information Infrastructure Protection (2003) Cyber Security Research and Development Agenda
National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report
National Research Council (2007) Toward a Safer and More Secure Cyberspace
National Research Council (1999) Trust in Cyberspace
van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware
Varian, Hal (2000) Managing Online Security Risks
Varian, Hal (2004) System Reliability and Free Riding
Author 1 | Author 2 | Year | Title | Source | Expertise | Full Text |
---|---|---|---|---|---|---|
Camp, L. Jean | Lewis, Stephen | 2004 | Economics of Information Security | Book | High:Economics | N/A |
Computing Research Association | 2003 | Four Grand Challenges in Trustworthy Computing | Independent Reports | None | ||
Department of Defense | 2007 | Mission Impact of Foreign Influence on DoD Software | Government Report | Low:Defense Policy/Procurement | ||
Grady, Mark F. | Parisi, Francesco | 2006 | The Law and Economics of Cybersecurity | Book | Low:Economics; Low:Law | N/A |
Johnson, Eric M. | 2008 | Managing Information Risk and the Economics of Security | Book | High:Economics | N/A | |
National Institute of Standards and Technology | 2006 | SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security | Government Report | Moderate:Technology | ||
Schneier, Bruce | 2008 | Schneier on Security | Book | None | Purchase |
- Subcategories: None