Skip to main content

Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10242))

Abstract

We propose an extension of the Gordon-Loeb model by considering multi-periods and relaxing the assumption of a continuous security breach probability function. Such adaptations allow capturing dynamic aspects of information security investment such as the advent of a disruptive technology and its consequences. In this paper, the case of big data analytics (BDA) and its disruptive effects on information security investment is theoretically investigated. Our analysis suggests a substantive decrease in such investment due to a technological shift. While we believe this case should be generalizable across the information security milieu, we illustrate our approach in the context of critical infrastructure protection (CIP) in which security cost reduction is of prior importance since potential losses reach unaffordable dimensions. Moreover, despite BDA has been considered as a promising method for CIP, its concrete effects have been discussed little.

Dimitri Percia David—Short paper submitted to the 2016 CRITIS conference under topic 1: Technologies: Innovative responses for the protection of cyber-physical systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The terms cyber security and information security are considered as synonyms and therefore substitutable in this paper.

  2. 2.

    E.g. externalities arising when decisions of one party affects those of others [2].

  3. 3.

    In economic terms, the notion of disruptive technology [7] refers to a radically innovative technology that significantly disrupts existing economic structures, markets and value networks, displacing established leading products and services.

  4. 4.

    In this paper, the term big data refers to data whose complexity impedes it from being processed (mined, managed, queried and analyzed) through conventional data processing technologies [10, 11]. The complexity of big data is defined by three aspects: \(1^\circ \), the volume (terabytes, petabytes, or even exabytes (\(1000^{6}\) bytes); \(2^\circ \), the velocity (referring to the fast paced data generation); and \(3^\circ \), the variety (referring to the combination of structured and unstructured data) [10, 11]. The field of BDA is related to the extraction of value from big data – i.e., insights that are non-trivial, previously unknown, implicit and potentially useful [11]. BDA extracts patterns of actions, occurrences, and behaviors from big data by fitting statistical models on those patterns through different data mining techniques (predictive analytics, cluster analysis, association rule mining, and prescriptive analytics) [5, 12].

  5. 5.

    The model description and its assumptions have been previously explained in details by [8, 9].

  6. 6.

    [8] explicitly acknowledge that they «abstract from reality and assume that postulated functions are sufficiently smooth and well behaved », and therefore creating favorable conditions for applying basic differential calculus, simplifying the optimization problem of the security investment phenomenon. Although a smooth approximation of the security investment phenomenon done by [8] is a reasonable first approach in order to deliver insights concerning the problem of determining an optimal level of cyber security investment, such an approach lacks of realism. As explicitly mentioned by [8] themselves: “[...] in reality, discrete investment in new security technologies is often necessary to get incremental result. Such discrete investment results in discontinuities ”.

  7. 7.

    The following cases illustrate this claim. In BDA, an extremely large, fast paced and complex amount of information can be processed with significantly shortened timeframes and – once the fixed cost of the systems and algorithm for investigating threat patterns is invested – at almost zero marginal cost per additional unit of information [13]. Furthermore, the real-time analytics provided by big data algorithms are likely to neutralize any attacker’s information advantage, such that the probability of a cyber breach should be reduced. For example, an attacker can exploit zero-day vulnerabilities by knowing where to attack, while the defender does not know and hence has to protect all potential entry spots. As real-time analytics reveals both the time and the position of the attack as it happens, the defender can react precisely in the attacked spot only and thus saves any unnecessary investment in the protection of spots, which, eventually, are never attacked.

References

  1. Alcaraz, C., Zeadally, S.: Critical infrastructure protection: Requirements and challenges for the 21st century. Int. J. Crit. Infrastruct. Prot. 8, 53–66 (2015)

    Article  Google Scholar 

  2. Anderson, R.: Why information security is hard - an economic perspective, pp. 358–365. IEEE Comput. Soc (2001)

    Google Scholar 

  3. Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)

    Article  Google Scholar 

  4. Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 55–66. Springer, US (2010). https://doi.org/10.1007/978-1-4419-6967-5_4

    Chapter  Google Scholar 

  5. Cardenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics for security. IEEE Secur. Priv. 11(6), 74–76 (2013)

    Article  Google Scholar 

  6. Chen, H., Chiang, R.H., Storey, V.C.: Business intelligence and analytics: from big data to big impact. MIS Q. 36(4), 1165–1188 (2012)

    Google Scholar 

  7. Christensen, C., Raynor, M.E., McDonald, R.: What Is Disruptive Innovation? Harvard Business Review, Boston (2015)

    Google Scholar 

  8. Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 438–457 (2002)

    Article  Google Scholar 

  9. Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L., et al.: others: Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 6(01), 24 (2014)

    Google Scholar 

  10. Laney, D.: 3D data management: Controlling data volume, velocity and variety. META Group Research Note 6, 70 (2001)

    Google Scholar 

  11. Mahmood, T., Afzal, U.: Security analytics: big data analytics for cybersecurity: a review of trends, techniques and tools. In: 2013 2nd National Conference on Information Assurance (NCIA), pp. 129–134 (2013)

    Google Scholar 

  12. Sathi, A.: Big Data Analytics: Disruptive Technologies for Changing the Game. Mc Press, Los Angeles (2012)

    Google Scholar 

  13. Sowa, J.F.: Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley Pub., Reading (1983)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitri Percia David .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Percia David, D., Keupp, M.M., Ghernaouti, S., Mermoud, A. (2017). Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2016. Lecture Notes in Computer Science(), vol 10242. Springer, Cham. https://doi.org/10.1007/978-3-319-71368-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-71368-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-71367-0

  • Online ISBN: 978-3-319-71368-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics