Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Essay game theory
Introduction The prerequisite of the game theory requires at least two intelligent parties capable of making an intelligent decision based on the scenario of the task, which would be favorable for each of them. Business dependent on IT employs security manager or security administrator who are responsible for the allocation of the resources against fending off the possible vulnerability exploitation against the system. While the security experts have to defend all the vulnerable parameters with the limited resources, the intruder only has to successfully exploit a single vulnerability to cause substantial damage. This can be analogous to a model of game, where security admin and the intruder compete against each other where both try to optimize their move for their best benefit; security administrator will focus on maximizing the mitigation against the probable vulnerability exploit, whereas intruder will try to maximize the probability of successful attack. Background Related to the Problem The cyber threat to the organizations (FBI, 2016) from late 2000s have left researchers and security professionals wondering over the mechanism for the defenses (Strassmann, 2009). While the defense mechanism is well researched, a field left out is the analysis and consideration of the attacking model. An IT company might have million-dollar worth of latest firewalls to prevent any digital threat, but if they just employ a simple lock to close their main gate, any intruder with proper information can trespass into their facility and transfer crucial information, physically present at the perimeter. The same analogy can be applied to their telephony or internet system. To prevent any compromising against the Confidentiality, Availabi... ... middle of paper ... ...(Spaniel, 2016) Calculating the utility for attacker when the defender is willing to play and the attacker chooses to attack: Ux = a2(PD) + c2(1- PD) (iv) Uy = b2(PD) + d2(1- PD) (v) From equation (i), (ii), (iii), (iv) and (v) we can write; a2(PD) + c2(1- PD) = b2(PD) + d2(1- PD) Solving for PD , we get: PD = (d2 - c2) / [(d2 - c2) + (a2 - b2)] We have calculated the probability that defender will defend his perimeter, from the payoff matrix, similarly calculating the probability for attacker (PA) we get, PA = (d1 - b1) / [(d1 - b1) + (a1 - c1)] Summary This chapter established the relation and understanding of mixed strategy for two competing entities. In the next chapter, we will use the relation from this chapter into theoretical implementation on different scenarios that might occur in an IT organization.
plan of attack in case of the possibility of a two-front war. But, this plan required
and their use. In Committee on Deterring Cyber attacks: Informing Strategies and Developing Options (Ed.), Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. Washington, D.C.: National Academies Press.
Freedberg, Sydney J., Jr. "Breaking Defense." Breaking Defense. N.p., 25 Sept. 2013. Web. 24 Oct. 11111112013.
23), a strategy is competing differently using a set of actions to perform better over rivals and achieve greater profitability. It is about choosing to be different and making the correct choices to provide direction and guidance to employees and the company on what to do and what not to do.
Jens Grossklags & Jean Walrand (Eds.), Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) (p. 324). New York, NY: Springer Publishing.
Ever since you were a child you have unknowingly used game theory. When your parents gave you the option to choose a candy bar, your brain started thinking of all the possibilities that depended on which candy you chose. You would think which one would taste better, make your feel better, and maybe be healthier for you. In the end, you would narrow your choices down to one piece of candy and eat it happily. Game theory is the use of theory to think through all of the positive and negative possibilities that could happen in a problem and try to maximize the positive. Game theory is not just one theory, throughout the years is has spread into six main games. These games are: zero sum games, non-zero sum games, simultaneous move games, sequential move games, one-shot games, and repeated games. Each of these games will be covered more in depth in this essay, with the exception of zero-sum games. Dalton will be writing about the zero-sum game in his essay.
P is the subjective probability of the being caught and convicted; U(_) is the individuals utility function, which depend on Y and F; Y is the benefits from committing crime; F is the cost from committing crime if caught, such as punishment.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Can a man be driven from humble humanity to gross inhumanity by circumstance or situation? What effect do one's choices and training have on his morals? At some point in our lives we will all be forced to answer questions similar to these, and two characters in Connell's story "The Most Dangerous Game" are not exempt from these life decisions. Sanger Rainsford and General Zaroff are both wealthy, both are hunters, and eventually both men are put into situations where critical choices must be made. The choices the men make are derived from different situations, but both have similar results.
Self defense is the use of reasonable force to protect oneself or members of the family from bodily harm from the attack of an aggressor (Dictionary.law.com). Self defense should be taken seriously. In “The Most Dangerous Games,” Rainsford, the protagonist, was stranded on an island after falling off his yacht. He met another fellow hunter, Zaroff, the antagonist. Zaroff believed that hunting animals is boring, and instead hunting humans are more exciting and gives you a thrill. Zaroff offered Rainsford to hunt with him or to be hunted himself. And whoever kills each other first
Numerous definitions of strategy exist, in most circumstances strategy can loosely be explained as an overall plan of deployment of resources to ascertain a favourable position within a market (Zablah, Bellenger and Johnston 2004; Grant 1994, p 14). Further, imbedded in many successful organisations are strategies, the importance of which is to remain relevant in the market, and successful in the various attributes of business; profiteering, employee motivation, maintaining sustainable core competencies, effectiveness in operation, or efficiency in the conduction of operations. Therefore challenges involved in the formulation and implementation of a strategy can revolve around the overall external market, as well as internal
Creating secure networks and clear policies might seem as a solution to social engineering, but the unpredictable nature of humans driven by greed and curiosity, will give rise to new techniques to beat the systems. However, organizations should come up with procedures and policies defining the roles and responsibilities of each user not just the security personnel. This should be followed by ensuring policies are properly followed and there is regular training.
One skirmish does not win a war. You might be successful at fending off an attack, but the hackers will return. Because the war is still underway, you can never afford to drop your guard just because you have won a battle or two.
The ability to conduct warfare through technological methods has increased information security awareness and the need to protect an entities infrastructure. Subsequently, cyber warfare produces increased risk to security practitioners that employ technology and other methods to mitigate risks to information and the various systems that hold or transmit data. A significant risk to information lies in the conduct of electronic commerce, hereinafter called e-commerce. E-commerce is the purchasing or selling of goods and/or services through the internet or other electronic means (Liu, Chen, Huang, & Yang, 2013). In this article, the researcher will discuss cyber warfare risks, present an evaluation on established security measures, identify potential victims of identity theft, and present an examina...