Justifying Spam and E-mail Virus Security Investments: A Case Study

نویسندگان

  • Hemantha S. B. Herath
  • Tejaswini Herath
چکیده

Justifying Spam and E-mail Virus Security Investments: A Case Study Hemantha Herath and Tejaswini Herath Abstract: Our paper investigates the problem of justifying security investments concerning spam and email virus using real life data from a midsize North American university. We formulate the spam and email virus security problem as a capital budgeting problem using operating characteristic (ROC) curves in a decision theoretic framework. Prior research has investigated the optimal configuration in a detection system focusing on hacking. In a corporate setting when making the case for information security not only the technology specific detection costs but other costs (capital expenditures, operating costs and opportunity costs) have to be considered. We contribute to the current literature by investigating the spam email and virus problem and demonstrating how theoretical research can really be applied in practice through a real life case study.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection

Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...

متن کامل

A Classification Method for E-mail Spam Using a Hybrid Approach for Feature Selection Optimization

Spam is an unwanted email that is harmful to communications around the world. Spam leads to a growing problem in a personal email, so it would be essential to detect it. Machine learning is very useful to solve this problem as it shows good results in order to learn all the requisite patterns for classification due to its adaptive existence. Nonetheless, in spam detection, there are a large num...

متن کامل

A Mathematical Theory of Internet Security Investments Under Cyber-Insurance Coverage

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk...

متن کامل

Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study

1. In your opinion, what are the most common ways malicious software (viruses etc.) gets into our company’s network? 2. Where can you find our company’s official information security instructions? 3. Have you applied the instructions concerning SC’s e-mail use to your work? If yes, give some examples of what instructions and for what purposes they were used. 4. Did you find the instructions use...

متن کامل

Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem

Recently the number of undesirable messages coming to e-mail has strongly increased. As spam has changeable character the anti-spam systems should be trainable and dynamical. The machine learning technology is successfully applied in a filtration of e-mail from undesirable messages for a long time. In this paper it is offered to apply Case Based Reasoning technology to a spam filtering problem....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006