Game of information security investment: Impact of attack types and network vulnerability

被引:48
作者
Wu, Yong [1 ,2 ]
Feng, Gengzhong [1 ,3 ]
Wang, Nengmin [1 ,3 ]
Liang, Huigang [4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Management, Xian 710049, Shaanxi, Peoples R China
[2] City Univ Hong Kong, Dept Syst Engn & Engn Management, Hong Kong, Hong Kong, Peoples R China
[3] Minist Educ Proc Control & Efficiency Engn, Key Lab, Xian 710049, Shaanxi, Peoples R China
[4] E Carolina Univ, Coll Business, Dept Management Informat Syst, Greenville, NC 27858 USA
关键词
Information security investment; Attack types; Network vulnerability; Game theory; Economic incentives; ECONOMICS; RISKS;
D O I
10.1016/j.eswa.2015.03.033
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The level of firms' information security investment has recently become a critical issue in the management of IT infrastructure. Prior studies have not considered attack types and firms interconnection simultaneously when investigating the optimisation of such investment. Using game theory, we demonstrate that the optimal security investment level of an interconnected firm against targeted attacks is different from that against opportunistic attacks. Our model shows that not all information security risks are worth fighting against. As the potential loss increases, it is unadvisable to increase the security investment proportionately. Firms should increase investments with intrinsic vulnerability when facing target attacks, but focus on those systems that fall into the midrange of intrinsic vulnerability when facing opportunistic attacks. Firms are unwilling to invest in security and often offload reliability problems onto others when the trusted interdependence relationship becomes tighter in the absence of economic incentives. Thus we also discuss two economic incentives to motivate firms: liability and security information sharing. We find-that if the rules are set properly, both economic incentives are effective to not only internalise the negative externality and improve a firm's security level, but also reduce the total expected cost. We show that firms' optimal investments of liability always increase with the increasing number of firms, but the optimal investments on security information sharing increase only when the number of firms is large enough. These insights draw attention to many trade-offs firms often face and the importance of accurate assessment of firms' security environment. Future research directions are discussed based on the limitations and possible extensions of this study. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:6132 / 6146
页数:15
相关论文
共 33 条
  • [21] Krebs B., 2014, KREBS SECUR
  • [22] Interdependent security
    Kunreuther, H
    Heal, G
    [J]. JOURNAL OF RISK AND UNCERTAINTY, 2003, 26 (2-3) : 231 - 249
  • [23] Contracting Information Security in the Presence of Double Moral Hazard
    Lee, Chul Ho
    Geng, Xianjun
    Raghunathan, Srinivasan
    [J]. INFORMATION SYSTEMS RESEARCH, 2013, 24 (02) : 295 - 311
  • [24] OGUT H, 2005, 4 WORKSH EC INF SEC
  • [25] The strategic values of information security in business
    Parker, DB
    [J]. COMPUTERS & SECURITY, 1997, 16 (07) : 572 - 582
  • [26] Ponemon I., 2013, 2013 cost of data breach study: Global analysis
  • [27] Richardson R., 2011, CSI 15th Annual Computer Crime and Security Survey
  • [28] Straub DW, 2008, ADV MANAG INFORM SYS, V11, P5
  • [29] Effective IS Security: An Empirical Study
    Straub, Detmar W., Jr.
    [J]. INFORMATION SYSTEMS RESEARCH, 1990, 1 (03) : 255 - 276
  • [30] Varian H, 2004, ADV INF SEC, V12, P1