Showing 1 - 7 of 7
Persistent link: https://www.econbiz.de/10009788613
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10012432466
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10013200062
The article analyzes how a defender determines a balance between protecting an object (passive defense) and striking preventively against an attacker seeking to destroy the object (active defense). The attacker analogously determines a balance between attacking and protecting against the...
Persistent link: https://www.econbiz.de/10009366446
A system of two components is analyzed as a two-period game. After period 1 the system can be fully operational, in two states of intermediate degradation, or fail. Analogously to changing failure rates in dependent systems analyzed with Markov analysis, unit costs of defense and attack, and...
Persistent link: https://www.econbiz.de/10010552460
A system of components can be in series, parallel, or combined series/parallel. The components and system are protected individually and overarchingly by a defender, and attacked individually and overarchingly by an attacker. Both layers of protection have to be breached for an attack to be...
Persistent link: https://www.econbiz.de/10010660904
This paper models the situation where the attacker’s resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker’s resource capabilities. An attacker targets one of two assets. The attacker’s resources and...
Persistent link: https://www.econbiz.de/10011131891