Modeling the “Tragedy of the Commons” Archetype in Enterprise Computer Security
نویسندگان
چکیده
The purpose of this study is to understand observed behavior and to diagnose and find solutions to issues encountered in organizational computer security using a systemic approach, namely system archetypes. In this paper we show the feasibility of archetypes application and the benefits of simulation. We developed a model and simulation of some aspects of security based on system dynamics principles. The system dynamics simulation model can be used in support of decision-making, training, and teaching regarding the mitigation of computer security risks. In this paper, we describe the archetype “Tragedy of the Commons”, in which an organization’s efforts at improvements fail to consider the consumption of a shared resource, and we show the relevance of this archetype in the context of security. We describe a scenario where this archetype can help in diagnosis and understanding, and present simulation of “what-if” scenarios suggesting how an organization might remedy problems observed and maximize its gains from security efforts.
منابع مشابه
Why Computer Security Fails – An Economic View
Computer security is addressed from the economic point of view rather than the more traditional technical one. The reasons why security fails, such as the cost of security, incentive failures, Tragedy of the Commons and the lack of knowledge are investigated. Finally, some of the proposed (economics-based) solutions to security problems such as enforcing liabilities and government regulation ar...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملNew Realities of the Enterprise Management System Information Support: Economic and Mathematical Models and Cloud Technologies
The paper focuses on the urgency of the implementation of cloud technologies, which are a necessary condition for the development of enterprise management systems, give rise to a complex of insufficiently studied phenomena and processes and determine the need to find new tools in making and implementing reasonable management decisions. In the process of research, the sequence of construction an...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کاملA Note on Funaki and Yamato’s Tragedy of the Commons
In the model of Funaki and Yamato (1999) the tragedy of the commons can be avoided with pessimistic players, while this does not hold for optimistic players. We propose a new core concept to overcome this puzzle and provide numerical simulations of simple games where the conclusions coincide or are less sensitive to behavioural assumptions.
متن کامل