Information and network management security Investment

Nkhoma, Mathews Z. and Jahankhani, Hamid and Mouratidis, Haralambos (2007) ‘Information and network management security Investment’, Proceedings of Advances in Computing and Technology. (AC&T) The School of Computing and Technology 2nd Annual Conference. University of East London, pp. 89-100.

[img]
Preview
Text
Nkhoma, MZ (2007) AC&T 89.pdf - Accepted Version
Available under License Creative Commons Attribution No Derivatives.

Download (279Kb) | Preview
Official URL: http://www.uel.ac.uk/act/proceedings/documents/ACT...

Abstract

In today’s business environment it is difficult to obtain senior management approval for the expenditure of valuable resources to “guarantee “that a potentially disastrous event will not occur that could affect the organisation performance. Analysing potential risk and the allocation of resources for computer network security and business continuity require strategic, long-term planning. Most companies tend to be reactive and respond with quick infrastructure solutions. A strategic approach to computer network security leads to a more efficient plan and a less expensive risk-management strategy. Financial modelling is a fundamental component of all business investment cases. IT security investment proposals have unique qualities that can pose expenditure justification challenges. This paper aims to explore various financial models and to develop one that IT managers can effectively use to support their business cases.

Item Type: Conference or Event Item (Paper)
Additional Information: Citation: Nkhoma, M.Z., Jahankhani, H., Mouratidis, H. (2007) ‘Information and network management security Investment’ Proceedings of Advances in Computing and Technology, (AC&T) The School of Computing and Technology 2nd Annual Conference, University of East London, pp.89-100.
Divisions: Schools > Architecture Computing and Engineering, School of
Depositing User: Mr Stephen Grace
Date Deposited: 19 Jul 2010 12:43
Last Modified: 27 Sep 2012 11:58
URI: http://hdl.handle.net/10552/872

Actions (login required)

View Item View Item