Justifying Spam and E-mail Virus Security Investments: A Case Study
نویسندگان
چکیده
Justifying Spam and E-mail Virus Security Investments: A Case Study Hemantha Herath and Tejaswini Herath Abstract: Our paper investigates the problem of justifying security investments concerning spam and email virus using real life data from a midsize North American university. We formulate the spam and email virus security problem as a capital budgeting problem using operating characteristic (ROC) curves in a decision theoretic framework. Prior research has investigated the optimal configuration in a detection system focusing on hacking. In a corporate setting when making the case for information security not only the technology specific detection costs but other costs (capital expenditures, operating costs and opportunity costs) have to be considered. We contribute to the current literature by investigating the spam email and virus problem and demonstrating how theoretical research can really be applied in practice through a real life case study.
منابع مشابه
A New Hybrid Approach of K-Nearest Neighbors Algorithm with Particle Swarm Optimization for E-Mail Spam Detection
Emails are one of the fastest economic communications. Increasing email users has caused the increase of spam in recent years. As we know, spam not only damages user’s profits, time-consuming and bandwidth, but also has become as a risk to efficiency, reliability, and security of a network. Spam developers are always trying to find ways to escape the existing filters therefore new filters to de...
متن کاملA Classification Method for E-mail Spam Using a Hybrid Approach for Feature Selection Optimization
Spam is an unwanted email that is harmful to communications around the world. Spam leads to a growing problem in a personal email, so it would be essential to detect it. Machine learning is very useful to solve this problem as it shows good results in order to learn all the requisite patterns for classification due to its adaptive existence. Nonetheless, in spam detection, there are a large num...
متن کاملA Mathematical Theory of Internet Security Investments Under Cyber-Insurance Coverage
Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk...
متن کاملImproving Employees' Compliance Through Information Systems Security Training: An Action Research Study
1. In your opinion, what are the most common ways malicious software (viruses etc.) gets into our company’s network? 2. Where can you find our company’s official information security instructions? 3. Have you applied the instructions concerning SC’s e-mail use to your work? If yes, give some examples of what instructions and for what purposes they were used. 4. Did you find the instructions use...
متن کاملTwo Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem
Recently the number of undesirable messages coming to e-mail has strongly increased. As spam has changeable character the anti-spam systems should be trainable and dynamical. The machine learning technology is successfully applied in a filtration of e-mail from undesirable messages for a long time. In this paper it is offered to apply Case Based Reasoning technology to a spam filtering problem....
متن کامل