Role of Intelligence Inputs in Defending against Cyber Warfare and Cyber Terrorism
نویسندگان
چکیده
This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium depends on the level of government expenditure in intelligence. We find that the optimal level of intelligence expenditure can change in seemingly unexpected ways in response to a shift in parameters. For example, reduced vulnerability of the infrastructural firm does not necessarily imply a reduction in intelligence gathering effort. We also exhibit circumstances under which a system of centralized security in which the government regulates both intelligence gathering as well as the system inspection regime of the infrastructural firm may not always be desirable because of strategic interactions between the players.
منابع مشابه
Understanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment lev...
متن کاملDefending Cyber Terrorism - A Game Theoretic Modeling Approach
In this work we attempt to develop a game theoretic model that can indicate the nuances of strategic investments in the face of possible cyber terrorist attacks. First, we briefly review the literature on terrorism. Second, we identify the „cyber‟ factors in terrorism, and how this new mode of attack alters the general scenario. Then, beginning with a naïve counter terrorism model, we increment...
متن کاملIntroduction : Òyou Want 1389 ? We Can Do That !ó --the Geopolitics of Everyday Technics
The post 9/11 Western World has been heavily marked by a near nearparanoid emphasis on the catastrophic threats posed by so-called cyber terrorism. Such cyber terror attacks, however, have, so far, been noticeable by their absence. At the same time a much more hidden, but increasingly pervasive form of forced demodernisation state infrastructural warfare is emerging as a central component of co...
متن کاملDigital Forensics in a Cyber Warfare Context
The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context o...
متن کاملDesigning Cyber Warfare Information Infrastructure Resilience
Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targ...
متن کامل