Modeling the “Tragedy of the Commons” Archetype in Enterprise Computer Security

نویسندگان

  • Shalom N. Rosenfeld
  • Ioana Rus
  • Michel Cukier
چکیده

The purpose of this study is to understand observed behavior and to diagnose and find solutions to issues encountered in organizational computer security using a systemic approach, namely system archetypes. In this paper we show the feasibility of archetypes application and the benefits of simulation. We developed a model and simulation of some aspects of security based on system dynamics principles. The system dynamics simulation model can be used in support of decision-making, training, and teaching regarding the mitigation of computer security risks. In this paper, we describe the archetype “Tragedy of the Commons”, in which an organization’s efforts at improvements fail to consider the consumption of a shared resource, and we show the relevance of this archetype in the context of security. We describe a scenario where this archetype can help in diagnosis and understanding, and present simulation of “what-if” scenarios suggesting how an organization might remedy problems observed and maximize its gains from security efforts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why Computer Security Fails – An Economic View

Computer security is addressed from the economic point of view rather than the more traditional technical one. The reasons why security fails, such as the cost of security, incentive failures, Tragedy of the Commons and the lack of knowledge are investigated. Finally, some of the proposed (economics-based) solutions to security problems such as enforcing liabilities and government regulation ar...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

New Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies

The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

A Note on Funaki and Yamato’s Tragedy of the Commons

In the model of Funaki and Yamato (1999) the tragedy of the commons can be avoided with pessimistic players, while this does not hold for optimistic players. We propose a new core concept to overcome this puzzle and provide numerical simulations of simple games where the conclusions coincide or are less sensitive to behavioural assumptions.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007