Controls-based approach for evaluation of information security standards implementation costs

According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (Pric...

Full description

Bibliographic Details
Main Authors: Dmitrij Olifer, Nikolaj Goranin, Arnas Kaceniauskas, Antanas Cenys
Format: Article
Language:English
Published: Vilnius Gediminas Technical University 2017-01-01
Series:Technological and Economic Development of Economy
Subjects:
Online Access:http://journals.vgtu.lt/index.php/TEDE/article/view/634
id doaj-9e43adc0a0d54562adc7c38aeea8d680
record_format Article
spelling doaj-9e43adc0a0d54562adc7c38aeea8d6802021-07-02T17:11:57ZengVilnius Gediminas Technical UniversityTechnological and Economic Development of Economy2029-49132029-49212017-01-0123110.3846/20294913.2017.1280558Controls-based approach for evaluation of information security standards implementation costsDmitrij Olifer0Nikolaj Goranin1Arnas Kaceniauskas2Antanas Cenys3Department of Graphical Systems, Faculty of Fundamental Sciences, Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223, Vilnius, LithuaniaDepartment of Information Systems, Faculty of Fundamental Sciences, Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223, Vilnius, LithuaniaDepartment of Graphical Systems, Faculty of Fundamental Sciences, Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223, Vilnius, LithuaniaDepartment of Information Systems, Faculty of Fundamental Sciences, Vilnius Gediminas Technical University, Saulėtekio al. 11, LT-10223, Vilnius, Lithuania According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs. However, information security cost-benefits assessment is complicated, because of lack of structured cost-benefit methods and issues with comparing IT security solutions in light of prevailing uncertainties. Existing methods are oriented on processes, environment lifecycles or specific standard implementations. Because of that, existing methods do not cover all needed security areas and methods reusability is a complicated task. Trying to solve this issue, we have proposed a new method for information standards implementation costs evaluation, based on information security controls. http://journals.vgtu.lt/index.php/TEDE/article/view/634security standardscost-benefit methodsrisk analysisvulnerability analysisgap analysisimpact
collection DOAJ
language English
format Article
sources DOAJ
author Dmitrij Olifer
Nikolaj Goranin
Arnas Kaceniauskas
Antanas Cenys
spellingShingle Dmitrij Olifer
Nikolaj Goranin
Arnas Kaceniauskas
Antanas Cenys
Controls-based approach for evaluation of information security standards implementation costs
Technological and Economic Development of Economy
security standards
cost-benefit methods
risk analysis
vulnerability analysis
gap analysis
impact
author_facet Dmitrij Olifer
Nikolaj Goranin
Arnas Kaceniauskas
Antanas Cenys
author_sort Dmitrij Olifer
title Controls-based approach for evaluation of information security standards implementation costs
title_short Controls-based approach for evaluation of information security standards implementation costs
title_full Controls-based approach for evaluation of information security standards implementation costs
title_fullStr Controls-based approach for evaluation of information security standards implementation costs
title_full_unstemmed Controls-based approach for evaluation of information security standards implementation costs
title_sort controls-based approach for evaluation of information security standards implementation costs
publisher Vilnius Gediminas Technical University
series Technological and Economic Development of Economy
issn 2029-4913
2029-4921
publishDate 2017-01-01
description According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomware) on target machines. Recent attacks (attack on Central Bank of Bangladesh, fraud attack on Mattel CEO and attack on Thailand state-run Government bank ATM) show, that criminals are very well organized, equipped and spend a lot of money and time to prepare their attacks. To protect themselves organizations are required to ensure security in depth principles and implement complex Security solutions, which are able to ensure the needed level of information security in appropriate costs. However, information security cost-benefits assessment is complicated, because of lack of structured cost-benefit methods and issues with comparing IT security solutions in light of prevailing uncertainties. Existing methods are oriented on processes, environment lifecycles or specific standard implementations. Because of that, existing methods do not cover all needed security areas and methods reusability is a complicated task. Trying to solve this issue, we have proposed a new method for information standards implementation costs evaluation, based on information security controls.
topic security standards
cost-benefit methods
risk analysis
vulnerability analysis
gap analysis
impact
url http://journals.vgtu.lt/index.php/TEDE/article/view/634
work_keys_str_mv AT dmitrijolifer controlsbasedapproachforevaluationofinformationsecuritystandardsimplementationcosts
AT nikolajgoranin controlsbasedapproachforevaluationofinformationsecuritystandardsimplementationcosts
AT arnaskaceniauskas controlsbasedapproachforevaluationofinformationsecuritystandardsimplementationcosts
AT antanascenys controlsbasedapproachforevaluationofinformationsecuritystandardsimplementationcosts
_version_ 1721325775420915712