Cargando…

The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures

The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed cost...

Descripción completa

Detalles Bibliográficos
Autores principales: Allodi, Luca, Massacci, Fabio, Williams, Julian
Formato: Online Artículo Texto
Lenguaje:English
Publicado: John Wiley and Sons Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9543271/
https://www.ncbi.nlm.nih.gov/pubmed/33960506
http://dx.doi.org/10.1111/risa.13732