Maximizing return on security safeguard investment with constraint satisfaction

Taek Lee, Dohoon Kim, Hoh Peter In

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Security development project planning is a tricky task because a security manager is not sure about what combination of effective safeguards should be implemented to prevent threats from occurring and damaging future business continuity. Such the decision making problem is necessarily accompanied with investment constraints (e.g. limited budget, positive return requirement, implementation advices). Thus, it is not easy to justify a security investment plan having the several constraints. In this paper, we model the constraints and formulate the decision making problem to find the best solution by using Integer Programming.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages172-175
Number of pages4
DOIs
Publication statusPublished - 2008
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Publication series

NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Fingerprint Dive into the research topics of 'Maximizing return on security safeguard investment with constraint satisfaction'. Together they form a unique fingerprint.

  • Cite this

    Lee, T., Kim, D., & In, H. P. (2008). Maximizing return on security safeguard investment with constraint satisfaction. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 172-175). [4511557] (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008). https://doi.org/10.1109/ISA.2008.59