期刊文献+

基于Gordon-Loeb模型的信息安全投资博弈研究

Research on the game of information security investment based on the Gordon-Loeb model
下载PDF
导出
摘要 为了研究信息安全投资外部性的影响,将Gordon-Loeb模型扩展到多组织博弈环境下,分别得出在正负外部性下,面对不同类型的攻击时,最优信息安全投资与脆弱性、潜在损失和投资效率的关系,并且比较了与社会最优条件下最优信息安全投资的差别。结果表明,正外部性条件下的信息安全投资变化规律与单一组织的情况相比存在一定相似之处,但负外部性下的信息安全投资改变较大,总体更加谨慎,并且攻击类型对于信息安全投资有着重要影响。 In order to study the impacts of externalities of information security investment, the Gordon-Loeb model was extended to a multi-organization game environment. The relationships of the optimal information security investment with vulnerability, potential loss and investment effectiveness when confronted with different attack types under the posi-tive and negative externalities were obtained respectively, and the difference with the optimal information security in-vestment under the social optimum condition was compared. The results show that there were some similarities in the varying pattern of information security investment between the condition of the positive externality and a single organi-zation, but information security investment under the negative externality changes greatly and was generally more cau-tious, and attack types also have important impacts on information security investment.
作者 王秦 朱建明
出处 《通信学报》 EI CSCD 北大核心 2018年第2期174-182,共9页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2017YFB1400700) 国家自然科学基金资助项目(No.U1509214 No.61272398)~~
关键词 信息安全投资 Gordon-Loeb模型 外部性 攻击类型 information security investment, Gordon-Loeb model, externality, attack type
  • 相关文献

参考文献3

二级参考文献21

  • 1彭俊好,徐国爱,杨义先,汤永利.基于效用的安全风险度量模型[J].北京邮电大学学报,2006,29(2):59-61. 被引量:17
  • 2吕俊杰,邱菀华,王元卓.基于相互依赖性的信息安全投资博弈[J].中国管理科学,2006,14(3):7-12. 被引量:14
  • 3Denning D. Reflectons on eyberweapons controls[J]. Computer Security Journal, 2000,16 (4): 3-53.
  • 4Gordon L A, Loeb M P, Lueyshyn W, et al. CSI/FBI Computer Crime and Security Survey[M]. Computer Security Institute, 2005.
  • 5Geer D, Soo Hoo K, Jaquith A. Information security : Why the future belongs to the quants[J]. IEEE Security and Privacy, 2003,1(4) :24-32.
  • 6Menoncin F. Optimal portfolio and background risk: An exact and an approximate solution[J]. Insurance Mathematics and Economics, 2002,31(2): 249-265.
  • 7Huang C D,et al. An economic analysis of the optimal information security investment in the case of a risk-averse firm[J]. Production Economics, 2008,114: 793-804.
  • 8Kaas R,Gavaerts M,Phaene J, et al. Modern actuarial risk theory [M]. Boston, MA: Kluwer Academic Publishers, 2001.
  • 9[2]Alfredo Garcia,Barry Horowitz.The Potential for Underinvestment in Intemet Security:Implications for Regulatory Policy[C].WWork-shop on Economics and Information Security,Cambridge England,2006.
  • 10[3]Ross Anderson,Tyler Moore.The Economics of Infonnation Securitv[J].Science.2006,314(5799):610-613,

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部