Showing 1 - 7 of 7
Persistent link: https://www.econbiz.de/10003403138
Persistent link: https://www.econbiz.de/10011879355
Persistent link: https://www.econbiz.de/10011754562
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10011812552
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10012432466
We build an analytical framework to model the strategic interactions between a firm and hackers. Firms invest in security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers...
Persistent link: https://www.econbiz.de/10014026808