Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are particularly interested in examining cases where the organization suffers from an underinvestment problem or inefficient spending on cybersecurity. To this end, we first model the cybersecurity environment of an organization. We then model non-cooperative cyber-security control-games between the defender which abstracts all defense mechanisms of the organization and the attacker which can exploit dif-ferent vulnerabilities at different network locations. To implement our methodology we use the SANS Top 20 Critical Security Controls and the 2011 CWE/SANS top 25 most dangerous software errors. Based on the profile of an organization, which forms ...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
We study the decision-making problem in cybersecurity risk planning concerning resource allocation s...
Losses due to cyber security incidents could be very significant for organisations. This fact forces...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
We study the decision-making problem in cybersecurity risk planning concerning resource allocation s...
Losses due to cyber security incidents could be very significant for organisations. This fact forces...
When undertaking cybersecurity risk assessments, it is important to be able to assign numeric values...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Cybersecurity has become a key factor that determines the success or failure of companies that rely ...