Decision support approaches for cyber security investment

نویسندگان

  • Andrew Fielder
  • Emmanouil A. Panaousis
  • Pasquale Malacaria
  • Chris Hankin
  • Fabrizio Smeraldi
چکیده

When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. As game theory captures the interaction between the endogenous organisation’s and attackers’ decisions, we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and 1Imperial College London. 2University of Brighton. 3Queen Mary University of London. Preprint submitted to Decision Support Systems December 21, 2015 a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. To compare these approaches we built a decision support tool and a case study regarding current government guidelines. The endeavour of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment. Going a step further in validating our work, we have shown that our decision support tool provides the same advice with the one advocated by the UK government with regard to the requirements for basic technical protection from cyber attacks in SMEs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing Decision Support Approaches for Cyber Security Investment

When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the...

متن کامل

An Example Collaborative Exercise for Decision Making in Investment in Cyber Security

The economics of investment in cyber security is a widely researched field. This paper describes the use of a multi-player collaborative exercise implemented on computers to help companies better understand investment decisions in cyber security. The investment model driving the collaborative exercise is an expected-value decision analysis that compares the reduction of cyber risks with other i...

متن کامل

A Framework for Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making

The threat to cyber security is real and growing. Organizations of all kinds must take protective measures, but effective resource allocation is difficult. This situation is due in part to uncertainty about the nature and severity of threats and vulnerabilities, as well as about the effectiveness of mitigating measures. A variety of models have been proposed to aid decision makers. We describe ...

متن کامل

Game Theoretic Solutions to Cyber Attack and Network Defense Problems

Game Theoretic Solutions to Cyber Attack and Network Defense Problems There are increasing needs for research in the area of cyber situational awareness. The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex. Current methods for alert correlation to detect ...

متن کامل

19th ICCRTS: C2 Agility: Lessons Learned from Research and Operations Paper 081: Using causal models to manage the cyber threat to C2 agility: working with the benefit of hindsight

The effectiveness and agility of an operation can be compromised through impact of adversary cyber activity on performance of key assets. The agility of adversary activity demands focused and effective investment in cyber security: there is a need for strong awareness of the military impact of threat vectors within the mission landscape, such that cyber security can be managed through a balance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Decision Support Systems

دوره 86  شماره 

صفحات  -

تاریخ انتشار 2016