• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Explain how the concept of 'Externality' is applicable?

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> General Security Discussion

View previous topic :: View next topic  
Author Message
turbomen
Just Arrived
Just Arrived


Joined: 09 Nov 2010
Posts: 0
Location: Hong Kong

Offline

PostPosted: Tue Nov 09, 2010 11:41 am    Post subject: Explain how the concept of 'Externality' is applicable? Reply with quote

Dear All,

Could you explain how the concept of 'Externality' is applicable to security?

Regards,
Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
SifuMike
Deceased
Deceased


Joined: 17 May 2004
Posts: 16777146
Location: Vancouver (not BC) WA (not DC)

Offline

PostPosted: Tue Nov 09, 2010 3:36 pm    Post subject: Reply with quote

Sounds like we're being asked to do someone's homework here,
Back to top
View user's profile Send private message
Dezaxa
Forum Fanatic
Forum Fanatic


Joined: 22 Mar 2007
Posts: 16777214


Offline

PostPosted: Tue Nov 09, 2010 5:00 pm    Post subject: Reply with quote

Does indeed sound like this is someone's homework assignment, but I'll bite.

An externality in economics is a cost or benefit that spills over from the parties involved in a transaction to third parties who had no part in consenting to the transaction. In the context of security I can see several example of this kind of thing:

1. Companies hosting personal data might choose to save money by not implementing proper security precautions. If a security breach occurs and the data is stolen and misused, the data subjects could suffer loss. In many countries this issue is addressed using data protection laws.

2. Users of computers may choose not to bother taking security precautions and this may result in their computers being herded into a botnet. As a result, third parties may become victims of DoS attacks or other criminal actiity.

3. Manufacturers and users of computer systems might forego security measures in order to keep costs down. A security breach might then result in a loss to third parties that cannot be fully recovered, e.g. a compromised control system might lead to an environmental disaster.

4. On the other side of the coin, if manufacturers and users do spend money to make their computer secure, this is money that could have been spent developing and growing their businesses. As a result, there is a knock-on effect for the whole economy of having to attend to security.

5. In the big picture, computers have become so ubiquitous and so critical to almost all aspects of life that developed countries simply could not function without them. This creates a risk of huge loss to everyone and is impossible to mitigate.
Back to top
View user's profile Send private message
turbomen
Just Arrived
Just Arrived


Joined: 09 Nov 2010
Posts: 0
Location: Hong Kong

Offline

PostPosted: Fri Nov 12, 2010 10:10 am    Post subject: Reply with quote

Thank you to your kind help. It is an examination review question but not assignment.
Back to top
View user's profile Send private message AIM Address Yahoo Messenger MSN Messenger
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> General Security Discussion All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register