network exposures. We study the problem of designing a network that provides the right individual incentives. Motivated by … cybersecurity, we first study the situation where the threat to the network comes from an intelligent adversary. We show that, by … addressed by disconnecting the network into two unequal components and sacrificing some nodes. At high costs, under …