Role of Intelligence Inputs in Defending against Cyber Warfare and Cyber Terrorism

نویسندگان

  • Aniruddha Bagchi
  • Tridib Bandyopadhyay
چکیده

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium depends on the level of government expenditure in intelligence. We find that the optimal level of intelligence expenditure can change in seemingly unexpected ways in response to a shift in parameters. For example, reduced vulnerability of the infrastructural firm does not necessarily imply a reduction in intelligence gathering effort. We also exhibit circumstances under which a system of centralized security in which the government regulates both intelligence gathering as well as the system inspection regime of the infrastructural firm may not always be desirable because of strategic interactions between the players.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach

In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment lev...

متن کامل

Defending Cyber Terrorism - A Game Theoretic Modeling Approach

In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...

متن کامل

Introduction : Òyou Want 1389 ? We Can Do That !ó --the Geopolitics of Everyday Technics

The post 9/11 Western World has been heavily marked by a near nearparanoid emphasis on the catastrophic threats posed by so-called cyber terrorism. Such cyber terror attacks, however, have, so far, been noticeable by their absence. At the same time a much more hidden, but increasingly pervasive form of forced demodernisation state infrastructural warfare is emerging as a central component of co...

متن کامل

Digital Forensics in a Cyber Warfare Context

The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context o...

متن کامل

Designing Cyber Warfare Information Infrastructure Resilience

Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017