Rodyti trumpą aprašą

dc.contributor.authorOlifer, Dmitrij
dc.contributor.authorGoranin, Nikolaj
dc.contributor.authorKačeniauskas, Arnas
dc.contributor.authorČenys, Antanas
dc.date.accessioned2023-09-18T16:48:33Z
dc.date.available2023-09-18T16:48:33Z
dc.date.issued2017
dc.identifier.issn2029-4913
dc.identifier.urihttps://etalpykla.vilniustech.lt/handle/123456789/117103
dc.description.abstractAccording to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (PricewaterhouseCoopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs. However, information security cost-benefits assessment is complicated, because of lack of structured cost-benefit methods and issues with comparing IT security solutions in light of prevailing uncertainties. Existing methods are oriented on processes, environment lifecycles or specific standard implementations. Because of that, existing methods do not cover all needed security areas and methods reusability is a complicated task. Trying to solve this issue, we have proposed a new method for information standards implementation costs evaluation, based on information security controls.eng
dc.formatPDF
dc.format.extentp. 196-219
dc.format.mediumtekstas / txt
dc.language.isoeng
dc.relation.isreferencedbyScopus
dc.relation.isreferencedbySocial Sciences Citation Index (Web of Science)
dc.source.urihttp://dx.doi.org/10.3846/20294913.2017.1280558
dc.subjectIK01 - Informacinės technologijos, ontologinės ir telematikos sistemos / Information technologies, ontological and telematic systems
dc.titleControls-based approach for evaluation of information security standards implementation costs
dc.typeStraipsnis Web of Science DB / Article in Web of Science DB
dcterms.accessRightsPatvirtinta 2017-04-18 Aida Gališanskienė
dcterms.references28
dc.type.pubtypeS1 - Straipsnis Web of Science DB / Web of Science DB article
dc.contributor.institutionVilniaus Gedimino technikos universitetas
dc.contributor.facultyFundamentinių mokslų fakultetas / Faculty of Fundamental Sciences
dc.contributor.departmentTaikomosios informatikos institutas / Institute of Applied Computer Science
dc.subject.researchfieldT 007 - Informatikos inžinerija / Informatics engineering
dc.subject.researchfieldN 009 - Informatika / Computer science
dc.subject.ltspecializationsL106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies
dc.subject.enSecurity standards
dc.subject.enCost-benefit methods
dc.subject.enRisk analysis
dc.subject.enVulnerability analysis
dc.subject.enGap analysis
dc.subject.enImpact
dc.subject.enSecurity controls
dcterms.sourcetitleTechnological and economic development of economy
dc.description.issueiss. 1
dc.description.volumeVol. 23
dc.publisher.nameTechnika; Taylor & Francis
dc.publisher.cityVilnius
dc.identifier.doi000394594600010
dc.identifier.doi2-s2.0-85010338931
dc.identifier.doi10.3846/20294913.2017.1280558
dc.identifier.elaba20204205


Šio įrašo failai

FailaiDydisFormatasPeržiūra

Su šiuo įrašu susijusių failų nėra.

Šis įrašas yra šioje (-se) kolekcijoje (-ose)

Rodyti trumpą aprašą