When investing in cyber security resources, information security managers have to follow effective decisionmaking strategies. We refer to this as the cyber security investment challenge.In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of the two. Our modelling starts by building a framework where we can investigate the effectiveness of a cyber security control regarding the protection of different assets seen as targets in presence of commodity threats. As game theory captures the interaction between the endogenous organisation’s and attackers’ decisions, we consider a 2-person control ga...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
When investing in cyber security resources, information security managers have to follow effective d...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
When investing in cyber security resources, information security managers have to follow effective d...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
When investing in cyber security resources, information security managers have to follow effective d...
When investing in cyber security resources, information security managers have to follow effective d...
Creative Commons License: Attribution 4When investing in cyber security resources, information secur...
When investing in cyber security resources, information security managers have to follow effective d...
When investing in cyber security resources, information security managers have to follow effective d...
AbstractWhen investing in cyber security resources, information security managers have to follow eff...
Abstract. In this paper we investigate how to optimally invest in cyber-security controls. We are pa...
In this paper we investigate how to optimally invest in cybersecurity controls. We are particularly ...
Cyber hygiene measures are often recommended for strengthening an organization’s security posture, e...
This work addresses the challenge “how do we make better security decisions?” and it develops techni...
In the information age, the scale and scope of cyber attacks on information systems is on the rise. ...
Investments on cybersecurity are essential for organizations to protect operational activities, deve...
A decision support system for cyber-security is here presented. The system aims to select an optimal...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...