Computer Security Requirements: An Investigation of Computer Security Costs
ANDERSON (JAMES P) AND CO FORT WASHINGTON PA
Pagination or Media Count:
A study of the costs associated with the three most popular security problem avoidance techniques provides a lower bound estimate of 3 million per year saving by applying technology. The cost savings estimated appear conservative because of the difficulty in quantifying costs of avoidance methods, and the omission of any consideration of costs of mission essential functions now being performed in isolation due to security constraints or requirements. Of the several approaches being taken to provide security, controlled sharing and Virtual Machine Monitors VMM systems to provide isolation will reduce costs projected from current estimates significantly. Of the two approaches, the controlled sharing development appears to have maximum beneficial impact because it is applicable without change in virtually all application areas.
- Economics and Cost Analysis
- Computer Hardware