Risk Management and Investment: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 12: Line 12:


Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
Franklin, Jason, et. al (2007) [[An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants]]
National Research Council (1999) [[Trust in Cyberspace]]


van Eeten, Michel J. G.  and  Bauer, Johannes M. (2008) [[Economics of Malware]]
van Eeten, Michel J. G.  and  Bauer, Johannes M. (2008) [[Economics of Malware]]
Line 50: Line 48:
|-
|-
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|National Research Council||||2007||[[Toward a Safer and More Secure Cyberspace]]||Independent Reports||Low:Research Processes; Low:Technology||[http://www.cyber.st.dhs.gov/docs/Toward_a_Safer_and_More_Secure_Cyberspace-Full_report.pdf ''Pdf'']
|-
|National Research Council||||1999||[[Trust in Cyberspace]]||Independent Reports||Moderate:Technology||[http://www.cyber.st.dhs.gov/docs/Trust%20in%20Cyberspace%20Report%201999.pdf ''Pdf'']
|-
|-
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']
|Schneier, Bruce||||2008||[[Schneier on Security]]||Book||None||[http://www.schneier.com/book-sos.html ''Purchase'']

Revision as of 11:28, 11 August 2010

TOC-> Issues-> Economics of Cybersecurity->Risk Management and Investment

Anderson, Ross (2001) Why Information Security is Hard

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Camp, L. Jean and Wolfram, Catherine (2004) Pricing Security

Franklin, Jason, et. al (2007) An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

van Eeten, Michel J. G. and Bauer, Johannes M. (2008) Economics of Malware

Varian, Hal (2000) Managing Online Security Risks

Varian, Hal (2004) System Reliability and Free Riding

Author 1 Author 2 Year Title Source Expertise Full Text
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Reports None Pdf
Department of Defense 2007 Mission Impact of Foreign Influence on DoD Software Government Report Low:Defense Policy/Procurement Pdf
Financial Services Sector Coordinating Council for Critical Infrastructure Protection 2008 Research Agenda for the Banking and Finance Sector Independent Reports None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Institute for Information Infrastructure Protection 2003 Cyber Security Research and Development Agenda Independent Reports Low/None:Technology Pdf
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
National Cyber Defense Initiative 2009 National Cyber Defense Financial Services Workshop Report Independent Report Moderate:Financial Services Infrastructure; Moderate:Acronym Tolerance Pdf
National Institute of Standards and Technology 2006 SP 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security Government Report Moderate:Technology Pdf
National Research Council 2007 Toward a Safer and More Secure Cyberspace Independent Reports Low:Research Processes; Low:Technology Pdf
National Research Council 1999 Trust in Cyberspace Independent Reports Moderate:Technology Pdf
Schneier, Bruce 2008 Schneier on Security Book None Purchase
  • Subcategories: None

Jump to Table of Contents