Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach

نویسنده

  • Tridib Bandyopadhyay
چکیده

In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment levels for countering cyber terrorism related risks. The proposed model characterizes the minimum budget below which a defending nation cannot feasibly contemplate to deploy more than one layer of defense against cyber terrorism. Beyond budgetary considerations, the paper also calculates the relative technological capabilities that the defending nation must possess to deploy a detection regime behind the first layer of protection regime. Finally, the author calculates and presents the optimal bifurcation of budget between the prevention and detection regimes should the defending nation possesses adequate funds to deploy layered defense in cyber terrorism. DOI: 10.4018/ijcwt.2011040103 International Journal of Cyber Warfare and Terrorism, 1(2), 18-34, April-June 2011 19 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. like automated relays in switchgears with the help of computer bugs. Cyber terrorism has been defined in different lights by the experts in the field (e.g., Politt, 1997; Denning, 2000)1. However, there are some generally agreed commonalities: Cyber terrorism is (a) perpetrated by groups having foreign allegiance or sub national agenda for political reasons, which (b) targets the property and life of nations, and (c) utilizes modern ICT (Information and Communication Technologies) and cyber space in the way the threat vectors are conceived, dispatched and activated in order to (d) create huge, visible and psychologically impactful outcomes of catastrophic proportions. Although such possibilities of electronically driven terrorism threats was not widely appreciated by the stakeholders of the networked infrastructure and systems before the 9/11 attack, active deliberations on such possibilities in the intelligence circles has been documented. Former FBI Director Lois Freeh, in a statement on May 10, 2001 before the United States Senate Committee on Appropriations, Armed Services, and Select Committee on Intelligence deposited, “The FBI believes cyber-terrorism, the use of cyber-tools to shut down, degrade, or deny critical national infrastructures, such as energy, transportation, communications, or government services, for the purpose of coercing or intimidating a government or civilian population, is clearly an emerging threat for which it must develop prevention, deterrence, and response capabilities.” As we increasingly embrace the ICT and cyber space in the way we conduct business, monitor and manage infrastructural services and interact in our social circles, and especially in view of the current trend in electronically mediated governance, the impacts of cyber terrorism are far reaching than before. Further, the distributed nature of the interconnected systems ensure that the attacks could be seeded and initiated from any point on the network and can be executed at any other point of the network emphasizing further gravity of the eventuality and difficulty of defense. The risks of cyber terrorism also exhibit interdependency between the defenders of the systems owing to the propagatory nature of threats, adding further difficulty in the way adequate defense could be ensured. It is thus imperative that the defense against cyber terrorism threats be fundamentally understood by the stakeholders of today’s globally interconnected information systems. As such, countering cyber terrorism is onerous. Investments are required to place prevention and detection technology controls on the network and information assets and also keep aside provisions for exigencies towards incidence response, incidence containment, and business and governance continuity. Funds are also needed for developing pre-attack defense capabilities and proactive measures in terms of intelligence and deterrence as well for creating and managing post detection capabilities like legal frameworks and enforcement capabilities. This further underscores the need to understand the dynamics of multifaceted investments in defense against cyber terrorism. In this work, we focus on the economic fundamentals of cyber defense and demonstrate the investment dynamics of countering cyber terrorism. In particular, we present a series of progressively mature models under the framework of decision theory where the adversaries are implicitly modeled in the way the threats are realized and against which the defender must establish optimal level of defense to combat the probabilistic attacks of cyber terrorism. The article is organized as shown. In the next section, we provide a brief review of the relevant literature. The section that follows, further divided into several subsections, incrementally contextualizes the decision theoretic investment models to suit the dynamical and pragmatic considerations of cyber terrorism. We then discuss the insights from the analysis of this model development effort and present our concluding thoughts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending Cyber Terrorism - A Game Theoretic Modeling Approach

In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...

متن کامل

Combination of real options and game-theoretic approach in investment analysis

Investments in technology create a large amount of capital investments by major companies. Assessing such investment projects is identified as critical to the efficient assignment of resources. Viewing investment projects as real options, this paper expands a method for assessing technology investment decisions in the linkage existence of uncertainty and competition. It combines the game-theore...

متن کامل

The revenue and preservation-technology investment sharing contract in the fresh-product supply chain:A game-theoretic approach

This research considers a fresh-product supply chain consisting of a single-buyer, a single-supplier for deteriorating products where the market demand is dependent on the retail price, fresh rate, and remaining rate. Firstly, in a competitive model, the primary decision variables (i.e., the supplier's wholesale price and preservation-technology investment and also buyer's order quantity and re...

متن کامل

Effect of Security Investment on Evolutionary Games

In this paper, we propose an evolutionary game model to analyze the investment decision making process in the cyber offender-defender interaction and provide a quantified approach for defender to calculate the safety threshold to avoid the occurrence of offender-leading game. Then we use simulation as a workbench to discuss the adjustment of each parameter to the security investment threshold. ...

متن کامل

Perception on Cyber Terrorism: A Focus Group Discussion Approach

Focus group discussion is an exploratory research technique used to collect data through group interaction. This technique provides the opportunity to observe interaction among participants on a topic under this study. This paper contributes to an understanding on the cyber terrorism conceptual framework through the analysis of focus group discussion. The proposed cyber terrorism conceptual fra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCWT

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2011