AMCIS_2021_TREO-AkinoriKahata-修订

ID:32482

阅读量:0

大小:0.30 MB

页数:1页

时间:2023-01-29

金币:5

上传者:战必胜
Estimating Business Impact of Cyberattacks
Twenty-Seventh Americas Conference on Information Systems, Montreal, 2021 1
AMCIS: Estimating the Business Impact of
Cyberattacks on Organizations
TREO Talk Paper
Akinori Kahata
The George Washington University
Cyber Security and Privacy Research Institut
e
akahata11@gwu.edu
Costis Toregas
The George Washington University
Cyber Security and Privacy Research Institut
e
toregas1@gwu.edu
Subhasish Dasgupta
The George Washington University
dasgupta@gwu.edu
Abstract
The importance of cybersecurity has increased in recent years and more and more organizations have to
invest in cybersecurity. The problem organizations face is in determining how large an investment they
need to make. A number of studies have tried to address this by using cybersecurity risk analysis and using
it to help determine the amount of investment. In this research we propose an model for cybersecurity
investment based on the business impact of cyberattacks. Our model focuses on the mechanism of
cyberattacks and identifies the critical factors that have a significant impact on the organization’s business.
To improve the accuracy of the prediction, we continue to research the previous studies and gather more
case studies to enhance and validate this model.
The overview of the model and estimation results
In our research we start by analyzing and evaluating the business impact of cyberattacks. To analyze the
impact, we examine the current cybersecurity risk analysis literature, and postulate a sequence of
cyberattack events and their effect on businesses as shown in Figure 1. Cyberattacks are identified as
security incidents, security incidents have a business impact, and the business impact result in financial
losses. Next, we examine what type of factors affect this sequence of events. Based on the general
characteristics of each phase, three assumptions can be derived from figure 1, (a) lower cybersecurity
preparedness has a higher likelihood of a significant security incident. (b) higher the dependence of an
organization on information technology, bigger is the business interruption. (c) larger the organization size,
more significant is the business interruption. Then, we identified the factors in Table 1 which can
quantitatively represent the assumed relationship in the model. By using these factors, we propose a
mathematical model which estimates the possible negative business impact of business interruption.
Figure. 1 The sequence of cyberattack cause business impact Table. 1 The factors of estimation equation
:      = 
Table. 2 The empirical evidence
Figure. 2 Estimation results
Table.2 provides an example of fitting a
real case to the model. Figure 2 shows
the comparison of the estimation
results and real data from annual
reports of organizations.
We plan to enhance and validate this
model using additional data and case
studies.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭