Security Investments

file

Visible to the public Optimal Security Investments in a Prevention and Detection Game

ABSTRACT: Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration tools to detect intruders, an