Vereskun M. V. The effectiveness of investments in information security: problems and solutions

Authors

  • М. В. Верескун Державний вищий навчальний заклад «Приазовський державний технічний університет», м. Маріуполь, Ukraine

DOI:

https://doi.org/10.31498/2225-6725.30.2015.74232

Keywords:

information security, investment, efficiency

Abstract

The article made a comparative analysis of the main advantages and disadvantages of three methods for determining cost effectiveness of information security of industrial enterprises. Two methods based on the use of aggregate indicators: ROI (Return on Investment - return on investment) for a certain period of time, TCO (Total Cost of Ownership - total cost of ownership of assets. Also used the method developed by Gartner Group. The main advantages of ROI is: the ability to predict results and complexity of IP-used indicators. The main disadvantage is the lack of opportunities to determine the value of the confidential information. The main advantages of the indicator of TCO are: better opportunities to account for all possible costs and the ability to justify the expenditure at different levels of readiness of the protection systems. The main disadvantages of the indicator TCO: problem-lichnosti selection of two projects that both reduce costs and the lack of accounting for the impact of risks. The main advantages of the methodology Gartner Group: accounting for the impact of risks and the ability to determine the effectiveness of system security for all levels of the company. The main disadvantage of this method is that it is based only on the analysis of possible risks.
It is proved that the use of any one technique does not give a complete picture of the effectiveness of spending on information security. The conclusion about the necessity of improvement of existing methodologies for assessing efficiency, the main focus of which is their joint use. To do this, the paper proposed an improved methodological approach to assessing the effectiveness of investments in information security, which is based on the procedures of the optimal choice of the protection system, the risk assessment during implementation of the selected alternative and evaluation capabilities of the enterprise regarding making a certain Fig-cov. To facilitate practical implementation of the developed approach in the article the algorithm of its realization.

References

  1. Грайворонський М. В. Безпека інформаційно-комунікаційних систем : підручник / М. В. Грайворонський, О. М. Новіков ; заг. ред. М. З. Згуровського. – К. : BHV, 2009. – 608 с.
  2. Ленков С. В. Методы и средства защиты информации : монография : в 2 т. Т. 2 : Ин-формационная безопасность / С. В. Ленков, Д. А. Перегудов, В. А. Хорошко. – К. : Арий, 2008. – 344 c.
  3. Основи інформаційної безпеки :підручник / В. І. Андреєв, В. О. Хорошко, В. С. Чередниченко, М. Є. Шелест ; за ред. В. О. Хорошка. – Вид. 2-е, доповн. і переробл. – К. : ДУІКТ, 2009. – 292 с
  4. Корченко А.Г. Анализ и оценивание рисков информационной безопасности / А. Г. Корченко, А.Е. Архипов, С.В. Казмирчук. – К.: ООО «Лазурит-Полиграф», 2013. – 275 с.
  5. Whitman M. Management of information security /M. Whitman, H. Mattord. – Gengage Learning, 2010. – 592p.
  6. Галатенко, В.А. Основы информационной безопасности. - М.: Интуит, 2012.
  7. Завгородний, В.И. Комплексная защита информации в компьютерных системах. - М.: Логос, 2013.
  8. Зегжда, Д.П., Ивашко, А.М. Основы безопасности информационных систем. - М.: Интуит, 2010.
  9. Проект «Информацонная безопаснность бизнеса» [Електроний ресурс]. - Режим доступу: http://www.infosecurity.ru/
  10. [Електроний ресурс]. - Режим доступу: http://www.securitylab.ru/.
  11. Украинский Информационный Центр Безопасности. [Електроний ресурс]. - Режим доступу: http://www.bezpeka.com/ -
  12. Продукты и услуги в области информационной безопасности. [Електроний ресурс]. - Режим доступу: http://www.globaltrust.ru/

Published

2015-09-03

How to Cite

Верескун, М. В. (2015). Vereskun M. V. The effectiveness of investments in information security: problems and solutions. REPORTER OF THE PRIAZOVSKYI STATE TECHNICAL UNIVERSITY Section: Economic Sciences, (30), 220–227. https://doi.org/10.31498/2225-6725.30.2015.74232