- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
The long view of security strategies for your network.
In my courses on the management of information assurance (IA) I make a point of telling my students that as managers, we should always be prepared to answer the following two questions from upper management about our proposed budgets for IA:
1. Why do we need to spend _so much money_ on IA?
2. If IA is so important to us, why aren’t you asking for _more_ money than this?
These questions focus on the idea that it should be possible to decide on optimal security expenditures for a specific organization using reason.
I want to be sure that readers are aware of a great divide in the world of security management: a battle between extreme proponents of quantitative risk-management methodologies and those who insist that only qualitative methods have any validity. Personally, I like using both approaches and will discuss my position in an upcoming newsletter.
In my last column, I began reviewing the book _Managing Cyber-Security Resources: A Cost-Benefit Analysis_ by Lawrence A. Gordon & Martin P. Loeb. Gordon and Loeb began their text with a well-written review of the importance of IA in their introductory chapter. They review the evolution of management structures, the growing acceptance of security standards, and the rise of organizations supporting IA.
Most important, they directly confront a fundamental difficulty faced by those proposing quantitative risk management for security-related decisions: the argument that such quantitative methods are based on an incomplete and necessarily faulty base of numerical information about the costs and probabilities of security incidents.
They warn that basing economic decisions about IA solely on best practices cannot guarantee that these spending levels are optimized. As they write, "if all firms take this approach, all firms may be either overspending for security or leaving themselves open to unnecessary risks... Herd behavior may feel good and have some merit, but it is no substitute for carefully conducted analysis." The authors argue that both methodologies have their place.
The authors throw down the gauntlet to extreme supporters of qualitative risk analysis and management (those who deny any role to quantitative methods): "an important goal of this book is to debunk the five cybersecurity myths listed here[:]
Myth 1: Cybersecurity activities do not lend themselves to cost-benefit analysis.
Myth 2: All cybersecurity breaches have a significant economic impact on organizations.
Myth 3: Determining the right amount to spend on cybersecurity activities is a crapshoot.
Myth 4: The role of risk management in cybersecurity is well understood.
Myth 5: Information sharing has reduced cybersecurity-related problems."
In my next column, I’ll be looking at Chapter 2: “A Cost-Benefit Framework for Cybersecurity.”
Read more about security in Network World's Security section.
M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services and teaching. He is Chief Technical Officer of Adaptive Cyber Security Instruments, Inc. and Associate Professor of Information Assurance in the School of Business and Management at Norwich University. Visit his Web site for white papers and course materials.