Show simple item record

dc.contributor.authorFielder, Aen_US
dc.contributor.authorPanaousis, Een_US
dc.contributor.authorMalacaria, Pen_US
dc.contributor.authorHankin, Cen_US
dc.contributor.authorSmeraldi, Fen_US
dc.date.accessioned2016-05-25T11:30:22Z
dc.date.submitted2016-04-12T12:27:13.240Z
dc.identifier.other10.1016/j.dss.2016.02.012
dc.identifier.urihttp://qmro.qmul.ac.uk/xmlui/handle/123456789/12516
dc.descriptionCreative Commons License: Attribution 4en_US
dc.description.abstractWhen investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision-support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. In terms of game theory we consider a 2-person control game between the security manager who has to choose among different implementation levels of a cyber security control, and a commodity attacker who chooses among different targets to attack. The pure game theoretical methodology consists of a large game including all controls and all threats. In the hybrid methodology the game solutions of individual control-games along with their direct costs (e.g. financial) are combined with a knapsack algorithm to derive an optimal investment strategy. The combinatorial optimisation technique consists of a multi-objective multiple choice knapsack based strategy. We compare these approaches on a case study that was built on SANS top critical controls. The main achievements of this work is to highlight the weaknesses and strengths of different investment methodologies for cyber security, the benefit of their interaction, and the impact that indirect costs have on cyber security investment.en_US
dc.description.sponsorshipOpen Access funded by Engineering and Physical Sciences Research Councilen_US
dc.language.isoenen_US
dc.subjectcs.GTen_US
dc.subjectcs.GTen_US
dc.subjectcs.CRen_US
dc.titleComparing Decision Support Approaches for Cyber Security Investmenten_US
dc.typeArticle
dc.rights.holder2016. The authors
pubs.author-urlhttp://arxiv.org/abs/1502.05532v1en_US
pubs.notesNot knownen_US
qmul.funderGames and Abstraction: The Science of Cyber Security::EPSRCen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record