期刊文献+

效用理论在信息安全投资优化中的应用 被引量:5

Application of Utility Theory in Investment Optimizing of Information Security
下载PDF
导出
摘要 为了解决组织预算过程中信息安全投资最优的问题,建立了安全投资与风险控制的关系模型,对安全投资的有效性进行了研究,提出了降低事件发生概率有效性及缓解损失有效性的新概念。采用效用理论作为组织财富、风险损失和安全投资的描述模型,指数效用函数作为组织投资收益的描述模型。分析了安全投资的边界,使用求偏导数取极值的方法对投资效用函数进行了研究,并求得最小投资的解。应用实例表明,基于效用的风险度量方法是科学的,损失效应越大的安全事件需要更大的安全投资。 The relation model between security investment and risk control was introduced to solve the problem of the optimal information security investment in corporation budget. The security investment efficiency was studied and the new concept of reducing the event probability and lost efficiency was presented. The utility theory was used to model system under the eorporation wealth, risk lost and security investment, and the exponential utility function was used to model the yield of corporation,maximum security investment bound was analyzed. The method using differential coefficient to achieve extremum was applied for the utility function and derived the result of optimal investment. The case study demonstrated the risk measurement method based on the utility was scientific and the security events producing more loss effect need more security investment.
出处 《计算机科学》 CSCD 北大核心 2009年第12期70-72,123,共4页 Computer Science
基金 国家自然科学基金项目(60873233) 陕西省科技攻关(2008-k04-21)资助
关键词 网络安全 效用理论 风险控制 信息安全投资 Network security, Utility theory,Risk control, Information security investment
  • 相关文献

参考文献8

  • 1Denning D. Reflectons on eyberweapons controls[J]. Computer Security Journal, 2000,16 (4): 3-53.
  • 2Gordon L A, Loeb M P, Lueyshyn W, et al. CSI/FBI Computer Crime and Security Survey[M]. Computer Security Institute, 2005.
  • 3Geer D, Soo Hoo K, Jaquith A. Information security : Why the future belongs to the quants[J]. IEEE Security and Privacy, 2003,1(4) :24-32.
  • 4陈天平,乔向东,郑连清,罗骞.图论在网络安全威胁态势分析中的应用[J].北京邮电大学学报,2009,32(1):113-117. 被引量:9
  • 5彭俊好,徐国爱,杨义先,汤永利.基于效用的安全风险度量模型[J].北京邮电大学学报,2006,29(2):59-61. 被引量:18
  • 6Menoncin F. Optimal portfolio and background risk: An exact and an approximate solution[J]. Insurance Mathematics and Economics, 2002,31(2): 249-265.
  • 7Huang C D,et al. An economic analysis of the optimal information security investment in the case of a risk-averse firm[J]. Production Economics, 2008,114: 793-804.
  • 8Kaas R,Gavaerts M,Phaene J, et al. Modern actuarial risk theory [M]. Boston, MA: Kluwer Academic Publishers, 2001.

二级参考文献11

共引文献25

同被引文献42

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部