Skip to main content

Productivity Space of Information Security in an Extension of the Gordon-Loeb’s InvestmentModel

  • Chapter
  • First Online:

Abstract

Information security engineers provide some countermeasures so that attacks will fail. This is vulnerabilityreduction. In addition, they provide other countermeasures so that attacks will not occur. This is threat reduction. In order to study how the optimal investment for information security is influenced by these reductions, this chapter introduces a productivity space of information security. In the same manner as in the Gordon-Loeb model, where vulnerability reduction is only considered, I suppose a productivity of information security characterizes economic effects of information security investment. In particular, I consider a productivity regarding threat reduction as well as a productivity regarding vulnerability reduction, and investigate a two-dimensional space formed by the two productivities. The investigation shows that the productivity space is divided into three areas: the no-investment area where both the productivities are low, the mid-vulnerability intensive area where the vulnerability reduction productivity is high but the threat reduction productivity is low, and the high-vulnerability intensive area where the threat reduction productivity is high.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Boehme, R., and Kataria, G. "Models and Measures for Correlation in Cyber-Insurance," The Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 2006.

    Google Scholar 

  • Dwork, C., and Naor, M. Pricing via Processing or Combatting Junk Mail, Lecture Notes in Computer Science (740), Springer, Berlin/Heidelberg, August 1992, pp. 139-147.

    Google Scholar 

  • Dynes, S., Brechbuhl, H., and Johnson, M. E. "Information Security in the Extended Enterprise: Some Initial Results from a Field Study of an Industrial Firm," The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005.

    Google Scholar 

  • Geer, D. E. “Making Choices to Show ROI,” Secure Business Quarterly (1:2), 2001, Q4.

    Google Scholar 

  • Gordon, L.A., and Loeb, M.P. "The Economics of Information Security Investment," ACM Transactions on Info rmation and System Security (5:4), November 2002, pp. 438-457.

    Article  Google Scholar 

  • Gordon, L.A., Loeb, M.P., and Lucyshyn, W. “Sharing Information on Computer Systems Security: An Economic Analysis,” Journal of Accounting & Public Policy (22:6), November/December 2003, pp. 461-485.

    Article  Google Scholar 

  • Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Richardson, R. “2005 CSI/FBI Computer Crime and Security Survey,” Computer Security Institute, July 2005, Available from: http://gocsi.com.

  • Hoo, K.S., Sudbury, A.W., and Jaquith, A.R. “Tangible ROI through Secure Software Engineering,” Secure Business Quarterly (1:2), 2001, Q4.

    Google Scholar 

  • Juels, A., and Brainard, J. “Client Puzzles: A Cryptographic Countermeasure against Connection Depletion Attacks,” in Proceedings of the Network and Distributed System Security Symposium 1999, San Diego, CA, February 1999, pp. 151-165.

    Google Scholar 

  • Karabacak, B., and Sogukpinar, L. “ISRAM: Information Security Risk Analysis Method,” Computers & Security (24:2), March 2005, pp. 147-159.

    Article  Google Scholar 

  • Kesan, J. P., Majuca, R. P., and Yurcik, W. J. "Cyberinsurance as a Market-Based Solution to the Problem of Cybersecurity: A Case Study," The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005.

    Google Scholar 

  • Kim, S., and Lee, H.J. “Cost-Benefit Analysis of Security Investments: Methodology and Case Study,” Lecture Notes in Computer Science (3482), Berlin/Heidelberg, Springer, May 2005, pp. 1239-1248.

    Google Scholar 

  • Kunreuther, H., and Heal, G. “Interdependent Security,” The Journal of Risk and Uncertainty (26:2/3), March 2003, pp. 231-249.

    Article  MATH  Google Scholar 

  • Kuper, P. “The Status of Security,” IEEE Security & Privacy (3:5), September/October 2005, pp. 51-53.

    Article  Google Scholar 

  • Laurie, B., and Clayton, R. "Proof-of-Work Proves Not to Work," The Third Annual Workshop on Economics of Information Security, Minneapolis, MN, May 2004.

    Google Scholar 

  • Liu, D., and Camp, L.J. "Proof of Work Can Work," The Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 2006.

    Google Scholar 

  • Liu, W., Tanaka, H., and Matsuura, K. “Empirical-Analysis Methodology for Information-Security Investmentand Its Application to a Reliable Survey of Japanese Firms,” IPSJ Journal (48:9), September 2007, pp. 3204-3218.

    Google Scholar 

  • Lovea, P. E.D., Iranib, Z., Standinga, C., Lina, C., and Burna, J. M. “The Enigma of Evaluation: Benefits, Costs and Risks of IT in Australian Small-Medium-Sized Enterprises,” Information & Management (42:7), October 2005, pp. 947-964.

    Article  Google Scholar 

  • Matsuura, K., and Imai, H. “Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack,” in Proceedings of the 1998 International Symposium on Information Theory and Its Applications, Mexico City, October 1998, pp. 466-470.

    Google Scholar 

  • Matsuura, K., and Imai, H. “Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks,” IEICE Transactions on Information and Systems (E83-D:5), May 2000, pp. 972-979.

    Google Scholar 

  • Ogut, H., Menon, N., and Raghunathan, S. "Cyber Insuranceand IT Security Investment: Impact of Interdependent Risk," The Fourth Workshop on the Economics of Information Security, Cambridge, MA, June 2005.

    Google Scholar 

  • Purser, S.A. “Improving the ROI of the Security Management Process,” Computers & Security (23:7), October 2004, pp. 542-546.

    Article  Google Scholar 

  • Tanaka, H., Matsuura, K., and Sudoh, O. “Vulnerability and Information Security Investment: an Empirical Analysis of e-Local Government in Japan,” Journal of Accounting and Public Policy (24:1), January/February 2005, pp. 37-59.

    Article  Google Scholar 

  • Varian, H. R. “System Reliability and Free Riding,” Workshop on Economics and Information Security, Berkeley, CA, May 2002.

    Google Scholar 

  • Whitman, M. E. “Enemy at the Gate: Threats to Information Security,” Communications of the ACM (46:8), August 2003, pp. 91-95.

    Article  Google Scholar 

Download references

Acknowledgments

This work was partly supported by grant no. 08D49001a from New Energy and Industrial Technology Development Organization. The author gratefully acknowledges the productive comments from the anonymous reviewers.

Authors

Editor information

Editors and Affiliations

Appendices

Appendix

A. Proof of Claim 1

The proof of Claim 1 goes as follows. From Eq. (7), we have

$$ \frac{{\partial z^* }}{{\partial v}} = \frac{{ - \left( {\frac{1}{v} - \frac{{\alpha / v}}{{\alpha \ln v + \beta \ln t}}} \right)(\alpha \ln v + \beta \ln t) + \left\{ {\ln (vL) + \ln ( - \alpha \ln v - \beta \ln t)} \right\}\frac{\alpha }{v}}}{{(\alpha \ln v + \beta \ln t)^2 }} $$
((13))

.

For

$$ v \in (0,1) $$

, due to the fact that α/v>0 and

$$ (\alpha \ln v + \beta \ln t)^2 > 0 $$

, the sign of Eq. (13) is given by the sign of

$$ G(v) \equiv \frac{{ - (\alpha \ln v + \beta \ln t)}}{2} + 1 + \ln (vL) + \ln ( - \alpha \ln v - \beta \ln t) $$
((14))
$$ = \frac{{ - \beta \ln t}}{\alpha } + 1 + \ln L + \ln ( - \alpha \ln v - \beta \ln t) $$
((15))

.

G(v) is monotonically decreasing for

$$ v \in (0,1) $$

. And we can see

$$ G(v) \to \infty $$

when

$$ v \to + 0 $$

. Therefore, with the help of the equivalence (12), we can see that

$$ (g(V_5 ) = 0) \wedge \left( { - V_5 \ln V_5 > \frac{{\beta \ln t}}{\alpha } \cdot V_5 + \frac{e}{{\alpha L}}} \right) $$
((16))

is a necessary condition for z * to take a maximum at v=V 5 such that V 3<V 5<V 4 and the point (α, β) is in the mid-vulnerabilityintensive area. However, if we assume the condition (16) is satisfied, then it brings a contradiction. In fact, from the first part of the condition (16) (i.e., G(V 5)=0), we have

$$ - \alpha \ln V_5 - \beta \ln t = \frac{{t^{\beta / \alpha } }}{{eL}} $$
((17))

.

Regarding the second part of the condition (16), since α/V 5>0, we have

$$ - V_5 \ln V_5 > \frac{{\beta \ln t}}{\alpha } \cdot V_5 + \frac{e}{{\alpha L}} \Leftrightarrow - \alpha \ln V_5 - \beta \ln t > \frac{e}{{LV_5 }} $$
((18))

.

Using Eq. (17) and Eq. (18), we have

$$ \frac{{t^{\beta / \alpha } }}{{eL}} > \frac{e}{{LV_5 }} $$

. That is,

$$ t^{\beta / \alpha } > \frac{{e^5 }}{{V_5 }} $$
((19))

.

Since

$$ 0 \leq t \leq 1 $$

tells

$$ t^{\beta / \alpha } \leq 1 $$

and 0<V 5<1 tells

$$ \frac{{e^2 }}{{V_5 }} > 1 $$

, the inequality (19) is a contradiction. Thus Claim 1 is proved.

B. List of Abbreviations

For the readers’ convenience, this appendix shows the following list of abbreviations used in this article:

  • DoS: Denial-of-Service.

  • ENBIS: Expected net benefits from an investment in information security.

  • GL model: Gordon-Loeb model.

  • ISP: Internet service provider.

  • POW: Proof-of-Work.

  • SBP function: Security breach probability function.

STP function: Security threat probability function.

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Matsuura, K. (2009). Productivity Space of Information Security in an Extension of the Gordon-Loeb’s InvestmentModel. In: Johnson, M.E. (eds) Managing Information Risk and the Economics of Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09762-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09762-6_5

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09761-9

  • Online ISBN: 978-0-387-09762-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics