作者: Lukas Demetz , Daniel Bachlechner
DOI: 10.1007/978-3-642-39498-0_2
关键词:
摘要: The threat of information security (IS) breaches is omnipresent. Large organizations such as Sony or Lockheed Martin were recently attacked and lost confidential customer information. Besides targeted attacks, virus malware infections, stolen laptops mobile devices, the abuse organizational IT through employees, to name but a few, also put assets in jeopardy. To defend against IS threats, invest countermeasures preventing, or, at least, reducing probability impact breaches. As budgets are constrained number be protected large, investments need deliberately evaluated. Several approaches for evaluation presented literature. In this chapter, we identify, compare, evaluate using example policy configuration management tool. Such tool expected reduce costs increase trustworthiness organizations. It was found that none analyzed can used without reservation assessment economic viability an example. We see, however, considerable potential new combining different elements existing approaches.