The Iterated Weakest Link - A Model of Adaptive Security Investment

Rainer Böhme,T. Moore

Published 2016 in Workshop on the Economics of Information Security

ABSTRACT

We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security.

PUBLICATION RECORD

  • Publication year

    2016

  • Venue

    Workshop on the Economics of Information Security

  • Publication date

    2016-03-16

  • Fields of study

    Computer Science, Economics

  • Identifiers
  • External record

    Open on Semantic Scholar

  • Source metadata

    Semantic Scholar

CITATION MAP

EXTRACTION MAP

CLAIMS

  • No claims are published for this paper.

CONCEPTS

  • No concepts are published for this paper.

REFERENCES

Showing 1-41 of 41 references · Page 1 of 1

CITED BY

Showing 1-66 of 66 citing papers · Page 1 of 1