When investing in cyber security resources, information security managers have to follow effective decisionmaking strategies. We refer to this as the cyber security investment challenge.In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. As game theory captures the interaction between the endogenous organisation’s and attackers’ decisions, we consider a 2-person control ga...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
This paper has proposed a model of the computational core for the decision support system (DSS) when...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
Nowadays, cyber threats are considered among the most dangerous risks by top management of enterpris...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
This paper has proposed a model of the computational core for the decision support system (DSS) when...