Cyber defense resources & vulnerabilities
Author(s)
Wolff, Josephine
DownloadPoster (416.0Kb)
Terms of use
Metadata
Show full item recordAbstract
Investment in security is aimed at reducing losses due to security breaches and typically determined by calculating annualized loss expectancy (ALE) metrics. However, in the cybersecurity space there is inadequate data on the frequency of breaches, the costs associated with those breaches, and the effectiveness of countermeasures, for organizations to be able to perform meaningful ALE calculations. With rising rates of both IT security spending and online attacks, surveys indicate that many business and government executives are unsure of how to allocate resources for defense and whether their investments in security measures are making any
Description
Poster presented in the workshop on “Who Controls Cyberspace,” MIT, Cambridge, MA, United States, November 6-7, 2012.
Date issued
2012-11-06Publisher
Explorations in Cyber International Relations
Citation
Wolff, J. (2012, November 6–7). Cyber defense resources & vulnerabilities [Poster session]. ECIR Workshop on "Who Controls Cyberspace," MIT, Cambridge, MA.
Version: Final published version.
Collections
The following license files are associated with this item: