Accession Number:

ADA055165

Title:

Computer Security Requirements: An Investigation of Computer Security Costs

Descriptive Note:

Task rept.

Corporate Author:

ANDERSON (JAMES P) AND CO FORT WASHINGTON PA

Personal Author(s):

Report Date:

1976-01-01

Pagination or Media Count:

80.0

Abstract:

A study of the costs associated with the three most popular security problem avoidance techniques provides a lower bound estimate of 3 million per year saving by applying technology. The cost savings estimated appear conservative because of the difficulty in quantifying costs of avoidance methods, and the omission of any consideration of costs of mission essential functions now being performed in isolation due to security constraints or requirements. Of the several approaches being taken to provide security, controlled sharing and Virtual Machine Monitors VMM systems to provide isolation will reduce costs projected from current estimates significantly. Of the two approaches, the controlled sharing development appears to have maximum beneficial impact because it is applicable without change in virtually all application areas.

Subject Categories:

  • Economics and Cost Analysis
  • Computer Hardware

Distribution Statement:

APPROVED FOR PUBLIC RELEASE