Maximizing return on security safeguard investment with constraint satisfaction

Taek Lee, Dohoon Kim, Hoh In

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security development project planning is a tricky task because a security manager is not sure about what combination of effective safeguards should be implemented to prevent threats from occurring and damaging future business continuity. Such the decision making problem is necessarily accompanied with investment constraints (e.g. limited budget, positive return requirement, implementation advices). Thus, it is not easy to justify a security investment plan having the several constraints. In this paper, we model the constraints and formulate the decision making problem to find the best solution by using Integer Programming.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages172-175
Number of pages4
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Decision making
Integer programming
decision making
project planning
Managers
development planning
Planning
development project
continuity
budget
programming
manager
threat
Industry
Constraint satisfaction
Safeguards
Business continuity
Project planning
Threat
Development projects

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Lee, T., Kim, D., & In, H. (2008). Maximizing return on security safeguard investment with constraint satisfaction. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 172-175). [4511557] https://doi.org/10.1109/ISA.2008.59

Maximizing return on security safeguard investment with constraint satisfaction. / Lee, Taek; Kim, Dohoon; In, Hoh.

Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 172-175 4511557.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, T, Kim, D & In, H 2008, Maximizing return on security safeguard investment with constraint satisfaction. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511557, pp. 172-175, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/ISA.2008.59
Lee T, Kim D, In H. Maximizing return on security safeguard investment with constraint satisfaction. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 172-175. 4511557 https://doi.org/10.1109/ISA.2008.59
Lee, Taek ; Kim, Dohoon ; In, Hoh. / Maximizing return on security safeguard investment with constraint satisfaction. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 172-175
@inproceedings{a77660e44cb3464180836afb2eff4091,
title = "Maximizing return on security safeguard investment with constraint satisfaction",
abstract = "Security development project planning is a tricky task because a security manager is not sure about what combination of effective safeguards should be implemented to prevent threats from occurring and damaging future business continuity. Such the decision making problem is necessarily accompanied with investment constraints (e.g. limited budget, positive return requirement, implementation advices). Thus, it is not easy to justify a security investment plan having the several constraints. In this paper, we model the constraints and formulate the decision making problem to find the best solution by using Integer Programming.",
author = "Taek Lee and Dohoon Kim and Hoh In",
year = "2008",
month = "9",
day = "15",
doi = "10.1109/ISA.2008.59",
language = "English",
isbn = "9780769531267",
pages = "172--175",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

}

TY - GEN

T1 - Maximizing return on security safeguard investment with constraint satisfaction

AU - Lee, Taek

AU - Kim, Dohoon

AU - In, Hoh

PY - 2008/9/15

Y1 - 2008/9/15

N2 - Security development project planning is a tricky task because a security manager is not sure about what combination of effective safeguards should be implemented to prevent threats from occurring and damaging future business continuity. Such the decision making problem is necessarily accompanied with investment constraints (e.g. limited budget, positive return requirement, implementation advices). Thus, it is not easy to justify a security investment plan having the several constraints. In this paper, we model the constraints and formulate the decision making problem to find the best solution by using Integer Programming.

AB - Security development project planning is a tricky task because a security manager is not sure about what combination of effective safeguards should be implemented to prevent threats from occurring and damaging future business continuity. Such the decision making problem is necessarily accompanied with investment constraints (e.g. limited budget, positive return requirement, implementation advices). Thus, it is not easy to justify a security investment plan having the several constraints. In this paper, we model the constraints and formulate the decision making problem to find the best solution by using Integer Programming.

UR - http://www.scopus.com/inward/record.url?scp=51349121917&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51349121917&partnerID=8YFLogxK

U2 - 10.1109/ISA.2008.59

DO - 10.1109/ISA.2008.59

M3 - Conference contribution

AN - SCOPUS:51349121917

SN - 9780769531267

SP - 172

EP - 175

BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

ER -