نتایج جستجو برای: interdependent security

تعداد نتایج: 185170  

2016
Ashish R. Hota Abraham A. Clements Shreyas Sundaram Saurabh Bagchi

We introduce a game-theoretic framework to compute optimal and strategic security investments by multiple defenders. Each defender is responsible for the security of multiple assets, with the interdependencies between the assets captured by an interdependency graph. We formulate the problem of computing the optimal defense allocation by a single defender as a convex optimization problem, and es...

2010
Rainer Böhme Galina Schwartz

We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of. The framework features a common terminology and deals with the specific properties of cyber-risk in a unified way: interdependent security, correlated risk, and information asymmetries. A survey of existing models, tabulated according to our framework, reveals a discrepancy between info...

2010
Jun Zhuang J. Zhuang

Investment in defense by all agents is a socially optimum equilibrium in many interdependent security scenarios. However, practically, some agents might still choose not to invest in security due to bounded rationality and errors, thus decreasing the total social welfare. Previous work shows that providing subsidies may help induce more agents to invest. Our study suggests that giving subsidies...

Journal: :J. of Management Information Systems 2013
Xia Zhao Ling Xue Andrew B. Whinston

The interdependency of information security risks often induces firms to invest inefficiently in information technology security management. Cyberinsurance has been proposed as a promising solution to help firms optimize security spending. However, cyberinsurance is ineffective in addressing the investment inefficiency caused by risk interdependency. In this paper, we examine two alternative ri...

2009
Xia Zhao Ling Xue Andrew B. Whinston

The interdependency of information security risks poses a significant challenge for firms to manage security. Firms may overor under-invest in security because security investments generate network externalities. In this paper, we explore how firms can use three risk management approaches, third-party cyberinsurance, managed security service (MSS) and risk pooling arrangement (RPA), to address ...

2009
Forrest HARE

The new US administration has begun efforts to securitize the substantial problems the United States is currently facing in cyberspace. Recently, President Obama ordered his National Security Council to conduct a rapid review of existing measures being undertaken by the federal government, and provide recommendations for additional ones. Many stakeholders in the US government and private indust...

Journal: :CoRR 2015
Ebrahim Moradi Shahrivar Mohammad Pirani Shreyas Sundaram

We investigate certain structural properties of random interdependent networks. We start by studying a property known as r-robustness, which is a strong indicator of the ability of a network to tolerate structural perturbations and dynamical attacks. We show that random k-partite graphs exhibit a threshold for r-robustness, and that this threshold is the same as the one for the graph to have mi...

Journal: :Review of Economic Studies 2010

2010
Filipe Caldeira Edmundo Monteiro Paulo Simões

Today’s Critical Infrastructures (CI) are highly interdependent in order to deliver their services with the required level of quality and availability. Information exchange among interdependent CI plays a major role in CI protection and risk prevention for interconnected CI were cascading effects might occur because of their interdependencies. This paper addresses the problem of the quality of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید