• Title/Summary/Keyword: information security investment

Search Result 181, Processing Time 0.021 seconds

Optimization of Information Security Investment Considering the Level of Information Security Countermeasure: Genetic Algorithm Approach (정보보호 대책 수준을 고려한 정보보호 투자 최적화: 유전자 알고리즘 접근법)

  • Lim, Jung-Hyun;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.18 no.5
    • /
    • pp.155-164
    • /
    • 2019
  • With the emergence of new ICT technologies, information security threats are becoming more advanced, intelligent, and diverse. Even though the awareness of the importance of information security increases, the information security budget is not enough because of the lack of effectiveness measurement of the information security investment. Therefore, it is necessary to optimize the information security investment in each business environment to minimize the cost of operating the information security countermeasures and mitigate the damages occurred from the information security breaches. In this paper, using genetic algorithms we propose an investment optimization model for information security countermeasures with the limited budget. The optimal information security countermeasures were derived based on the actual information security investment status of SMEs. The optimal solution supports the decision on the appropriate investment level for each information security countermeasures.

A Study on Information Security Investment by the Analytic Hierarchy Process (AHP를 이용한 정보보호투자 의사결정에 대한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.139-152
    • /
    • 2008
  • Recently organizations identify information security as one of essential means for gaining competitive advantage. However, they do not actively increase investment in this area because they consider spending for information security as a cost rather than an investment. This is because organizations don't have a clear understanding of information security objectives which can be achieved through investment, and they don't have criteria for alternatives which can be considered in information security investment decision-making. In this paper we propose to model the decision-making process of information security investment by the AHP (Analytic Hierarchy Process). The results will show that availability is the most important criterion for the decision of information security alternatives, and intrusion detection is the most important information security alternative. We hope that the results of this paper provide a guideline for clear decision-making in information security investment.

  • PDF

How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study (기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구)

  • Park, Jaeyoung;Jung, Woojin;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Market Reaction to IT Security Investment Announcements (기업의 정보보호 공시가 기업가치에 미치는 영향)

  • Park, Jaeyoung;Jung, Woo-Jin
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.39-55
    • /
    • 2019
  • Although Firms have been increasing their information security significantly to handle increased security risks, the effects of information security were not well understood. This study aims to investigate the market value of information security by employing the event study methodology. Our research also explores how market responses vary depending on the type of information security announcements. We collected 177 firm-level information security announcements between 2001 and 2017 in South Korea. For all samples, our results indicate that the stock market positively reacts to information security announcements. We also conducted subsample analysis and found that while information security certification announcement has a positive impact on the stock market, information security activities (e.g. award, information security system) announcement had no impact on the stock market. Our study adopted a novel approach (i.e. event study) for investigating the effects of information security and found that information security investment positively affects firm value. Our results allow managers to measure the effects of information security investment and help them make right decisions on information security investment.

The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak (기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.

Information Security Investment Model and Level in Incomplete Information (불완전 정보 하의 정보보호 투자 모델 및 투자 수준)

  • Lee, Yong-pil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.855-861
    • /
    • 2017
  • Gordon & Loeb[1] suggested that the optimal level of investment decision of an enterprise is the point that the marginal benefit(MB) of information security investment is equal to the marginal cost(MC). However, many companies suffering from information security incidents are not aware of the fact that they are experiencing information security accidents and can not measure how much they are affected. In this paper, I propose a model of information security investment decision making under the incomplete information situation by modifying the Gordon & Loeb[1] model and compare the differences in investment level. Under the incomplete information situation the expected return from the information security investment tends to be lower than that of actual information security investment, and the level of investment is also less. This shows that if a third party such as the government gives accurate information such as the rate of incidents of information security accidents and the amount of damages, companies can expand their investment in information security.

A Study on the Investment Level and Administrative Competence of Information Security by Industry (산업별 정보보안의 투자 수준과 관리 역량에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.2
    • /
    • pp.89-102
    • /
    • 2023
  • The purpose of this study is to examine what are the important variables for information security compliance and whether the information security investment by the industry is different. To comply with the information security policies, the organization must establish measures to prevent or resolve information security incidents. This research process consists of four stages, and the analysis method was conducted with the categorical regression analysis and the correspondence analysis. The first analysis analyzed the independent variables that affect security regulations compliance. The rest of the analysis was conducted by industry in the order of security compliance regulations, manpower investment, and budget investment. As a result of the first analysis, this had positive effects on an organization and personal information protection awareness, joint operation organization of information protection, manpower and budget investment, corporate size, and industry. The correspondence analysis was conducted from the second analysis to the fourth analysis and it analyzed the differences in information security investment by industry. The second analysis showed that the construction industry, science and technology industry, and finance industry have higher compliance with security regulations than other industries. The third analysis showed that the financial industry and the science and technology industry were higher than other industries. The last analysis showed that the financial industry was higher than other industries. The theoretical contribution of this study provided the basis for updating the information security theory. The practical contribution of this study requires government support to reduce information security deviations by industry.

Information Security Investment and Security Breach: Empirical Study on the Reverse Causality (정보보호 투자와 침해사고의 인과관계에 대한 실증분석)

  • Shin, Ilsoon;Jang, Wonchang;Park, Heeyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1207-1217
    • /
    • 2013
  • This study utilizes raw data from "Research on the actual condition of firms' information security" of KISA (2010) and constructs panel dataset to analyze a causal relationship between information security investment and security breach. Using Difference in Difference estimation method we find the following results. First, while the usual causality that information security investment reduces security breach is not supported, the reverse causality that security breach increases information security investment is well explained. Second, contrary to the conventional wisdom, firms in the finance/insurance business sector show the most significant reverse causality pattern.

A Study on the Operational Performance by the Investment Level of Companies Information Security in the Digital Transformation(DX) Era (디지털 전환(DX) 시대에 기업의 정보보안 투자 수준에 따른 운영성과에 관한 연구)

  • Jung Byoungho;Joo Hyungkun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.119-131
    • /
    • 2024
  • The purpose of this study is to examine the operational performances by the investment level of information security in companies. The theoretical background summarized the meaning of information security, management information security, and network security. The research process was carried out in four stages. As a result of the analysis, the level of information security was classified into four groups, and the difference in operational performance was confirmed. According to the categorical regression analysis of the three dependent variables, independent variables such as network threats, non-network threats, executive information security awareness, industry, organizational size, and information security education all affected information security regulations, in-house information security checks, and information security budget investments. The theoretical implications of this study have contributed to updating the latest information security theory. Practical implications are that rational investments should be made on the level of information security of companies.