Home // International Journal On Advances in Security, volume 11, numbers 1 and 2, 2018 // View article
Optimal Security Protection for Sensitive Data
Authors:
George O. M. Yee
Keywords: optimal, security protection, assessment, sensitive data, vulnerability
Abstract:
The growth of the Internet has unfortunately been accompanied by an increasing number of attacks against an organization’s computing infrastructure, leading to the theft of sensitive data. In response to such incursions, the organization installs security measures (e.g., intrusion detection system) for protecting its sensitive data. However, this installation is often done haphazardly, without any objective guidance regarding how many vulnerabilities must be secured in order to achieve an acceptable level of protection. This paper shows how an organization can calculate estimates of security protection, and objectively use them to adjust the number of security measures installed, until an optimal level of protection is achieved, subject to certain constraints. This work extends the paper “Assessing Security Protection for Sensitive Data” published in SECURWARE 2017. Additional explanations, application examples, and related works have been included.
Pages: 80 to 90
Copyright: Copyright (c) to authors, 2018. Used with permission.
Publication date: June 30, 2018
Published in: journal
ISSN: 1942-2636