How to improve security by contracting security outsourcing
نویسنده
چکیده
There is an increasing number of articles and internet forums against outsourcing security and contracting Managed Security Services. In this type of articles and forums, outsourcing providers professionals are presented as a security threat to their customers.(An extreme example of this can be seen at Cio.com Forum (6)). The aim of this paper is to show customers the possible advantages of contracting outsourcing, not only in traditional areas but also in security, from the point of view of a worker at a outsourcing services provider. Security workers at outsourcers are IT security professionals and the only difference with other security colleagues is that “our” machines are providing services to our customers’ enterprises instead (really besides) to our own enterprise. From model indicated at SANS Security Essentials (1), we will see how Operations Security Program, Defence in-depth and Security Policies can be improved due to a collaborative relationship between customer and outsourcer. All depends on how customer faces outsourcing, signed contract and rely on outsourcer.
منابع مشابه
Private Policing Some Recent Myths, Developments and Trends
talk about international trends in private policing, giving a philosophical overview. Perhaps you could look at the development of private security, contracting out of police services and contracting in of police services, private security and its growth, pointing out the dangers etc. . . . You could illustrate that privatisation cannot be viewed in isolation, but rather that it all has system ...
متن کاملFrom performance to performativity: The legitimization of US security contracting and its consequences
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However,...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملOutsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers
Firms hesitate to outsource their network security to outside security providers (called Managed Security Service Providers or MSSPs) because an MSSP may shirk secretly to increase profits. In economics this secret shirking behavior is commonly referred to as the Moral Hazard problem. There is a counter argument that this moral hazard problem is not as significant for the Internet security outs...
متن کاملEconomics of Internet Security Outsourcing: Simulation Results Based on the Schneier Model
Dynamic and complex information security risks facing organizations are forcing them to take a hard look at outsourcing to Managed Security Service Providers (MSSPs). The potential advantage of outsourcing is to improve security levels at lower costs. Potential risks of outsourcing to an MSSP includes service quality uncertainty and the business risk of MSSP bankruptcy. In this paper we present...
متن کامل