首页> 外文学位 >Optimal investment in IS security: A game theoretical approach .
【24h】

Optimal investment in IS security: A game theoretical approach .

机译:IS安全的最佳投资:一种博弈论方法。

获取原文
获取原文并翻译 | 示例

摘要

With the development and popularity of personal computers, networks, the Internet, and Information Technologies (IT), the scale and scope of cyber attacks on IT-based information systems is on the rise. Recurring intrusions into information systems (IS) have increased financial losses, becoming burdensome to the operational budgets of many organizations. The objective of IS security is to minimize organizations’ potential losses by balancing the investment cost and financial losses from IS breaches. However, the optimal investment decision has been overlooked in the area of IS security. In this dissertation, we analyzed the optimal IS investment decision and its sensitivity to key factors. To accomplish this, we reviewed the literature in several fields, including IS security, cyber terrorism, economics, and deterrence.;In this dissertation, game theory and stochastic games were used to analyze the investment as the outcome of a game between organizations and hackers. We proposed a general one-stage static game model and a two-stage dynamic stochastic game model, both of which can be applied to all cyber crimes. The simulation results proved that breach function sensitivity, hacker’s self-deterrence, and hacker’s preferences affected the optimal investment in IS security.;The major contribution of this study is the proposal of new approaches to determine the optimal investment for IS security. We integrated the IS security economic investment discipline with the game theory discipline to address the drawbacks in each of these disciplines. We applied the reinforcement learning theory to IS security investment. Our stochastic game model properly modeled IS security investment and its reinforcement learning process. The stochastic game theoretical approach allowed us to model organizations’ factors and hacker’s factors, both of which affected the optimal investment. The stochastic game model also incorporated the time element, which most of the prior research on IS security did not take into account. This dissertation provides more insight and understanding into IS security management. The results of our study can be generalized to other areas such as cyber terrorism and financial fraud prevention.
机译:随着个人计算机,网络,Internet和信息技术(IT)的发展和普及,对基于IT的信息系统进行网络攻击的规模和范围正在不断增加。对信息系统(IS)的不断入侵增加了财务损失,使许多组织的业务预算负担沉重。 IS安全性的目的是通过平衡因IS违规而造成的投资成本和财务损失来最大程度地减少组织的潜在损失。但是,在IS安全领域中,最佳投资决策却被忽略了。本文分析了最优信息系统投资决策及其对关键因素的敏感性。为此,我们回顾了IS安全,网络恐怖主义,经济学和威慑等多个领域的文献;在本文中,我们使用博弈论和随机博弈分析了投资作为组织与黑客之间博弈的结果。 。我们提出了一个通用的一阶段静态博弈模型和一个两阶段动态随机博弈模型,两者都可以应用于所有网络犯罪。仿真结果表明,入侵功能的敏感性,黑客的自我威慑能力和黑客的偏好影响了IS安全的最佳投资。本研究的主要贡献是提出了确定IS安全最佳投资的新方法。我们将IS安全经济投资学科与博弈论学科整合在一起,以解决这些学科中每一个的弊端。我们将强化学习理论应用于IS安全投资。我们的随机博弈模型正确地建模了IS安全投资及其强化学习过程。随机博弈理论方法使我们能够对组织的因素和黑客的因素进行建模,这两者都影响了最佳投资。随机博弈模型还包含了时间元素,以前关于IS安全性的大多数研究都没有考虑到时间元素。本文为IS安全管理提供了更多的见识和理解。我们的研究结果可以推广到其他领域,例如网络恐怖主义和金融欺诈预防。

著录项

  • 作者

    Hua, Jian.;

  • 作者单位

    Morgan State University.;

  • 授予单位 Morgan State University.;
  • 学科 Economics Finance.;Information Science.
  • 学位 Ph.D.
  • 年度 2009
  • 页码 188 p.
  • 总页数 188
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号