Show simple item record

dc.contributor.advisorAudestad, Jan Arildnb_NO
dc.contributor.authorJohansen, Marie Kristinnb_NO
dc.date.accessioned2014-12-19T14:12:47Z
dc.date.available2014-12-19T14:12:47Z
dc.date.created2010-09-04nb_NO
dc.date.issued2007nb_NO
dc.identifier348444nb_NO
dc.identifierntnudaim:3512nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/261919
dc.description.abstractThe ratio of companies and organizations in Norway with a number of employees between 5 and 9 and Internet access increased from 66% to 86% during a five year period from 2001 to 2006. This increased use of the Internet puts small companies in a vulnerable position considering information security. They are known to be remarkably less willing to pay for information security compared to companies with more employees and more revenue. There is no such thing as two identical organizations. Every single one has it's own assets, weaknesses, employees and fundamental strategies. This makes each company's requirement for ICT-systems and information security identical as well. One solution might be good for one company but not for others. The differences in organizational structure and mentality is important variables in the process of building a good and secure infrastructure for the organizations. The Australian Computer Crime Surveys presents four readiness to protect factors, they consist of: Technology, policies, training and standards. These factors are used as a template for this thesis. If companies focus on these four aspects of information security, and succeed in combining them in an optimal manner they are said to have security in depth. There is no use in investing great amounts of money on technology if these are not used in a justifiable manner. There might be several reasons for improper use of the technologies, among them; lack of knowledge, laziness and carelessness. The companies continuous inability to calculate their own risks of adverse events and their total losses experienced due to computer crime makes it difficult to perform investment analysis on information security. Smaller companies do often have very limited amount of money to spend in general, and therefore also on information security. The investment analysis model chosen therefore take the maximum amount of spend able money into account. The accuracy of the model presented relies in the companies ability to present trustworthy data, and use both willingness to pay calculations and cost/benefit-investments analysis methods, resulting in a more thorough presentation of an ALE/ROI method used in a proof of concept using estimated data based on surveys, professionals experiences and prices used by a Norwegian ICT-operations company.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaimno_NO
dc.subjectSIE7 kommunikasjonsteknologino_NO
dc.subjectTelematikkno_NO
dc.titleValue of Investing in Information Security: A metastudy initiated by norSISnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber108nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record