.

Tuesday, September 24, 2019

LitReview Essay Example | Topics and Well Written Essays - 1750 words

LitReview - Essay Example Consideration of a threat doles out as a restriction or limitation that creates hindrances to perform required tasks as it dissuades to take action considering losses and costs. The whole process can be seen as a military action in which, concerned parties are restricted to take any military action that would affect the foreign policy objectives of the two involved states. Any sort of initiation of combating action is deterred. Rational choice theory is another theory that is influential in terms of cyber security. This theory allows contemplation and differentiation of varied accessible tactics. Cornish & Clarke (1986) inform that this theory emerged considering a notion related to cost benefit analysis. For example, a criminal conducts a crime when it appears advantageous to him. The theory also puts light on challenger’s haziness towards defender’s selected option. Nevertheless, the theory fails to resolve the strategized relationship between concerned parties, which are thoroughly reviewed in game theory (Understanding Society, 2008). The challengers select their intended defenders diligently and also work on their combating strategies considering previously employed strategies by the defenders. According to Cavusoglu, Raghunathan & Yue (2008), Decision theory is weak in handling the challengers’ worked out strategies and revisiting of defender’s actions because as per the theory, defender regards challenger’s devised performances as ‘exogenous’. According to the game theory, defender’s choices and challenger’s actions are endogenous. According to the decision theory, the scenarios according to which, the involved parties have to take action are predefined due to which, the actions performed by actors are regarded exogenous. Von Newmann and Morgenstern (1944) inform that each contestant is eligible to evaluate ‘variables’ of his actions only. There are rational rules involved in cons idering of variables and comprehension of variables of other’s actions, which cannot be determined statistically. Therefore, it has been required to explore a more viable theory that can be applied to cyber security. Researchers have moved towards game theory to comprehend the relationship between actors in cyber security issues. In addition, Nisan and Ronen (1999), Nisan (2007) inform about mechanism design that has assisted towards development of protection and privacy mechanisms. These mechanisms are designed with the support of systematic results. Because of usage of game theory, there are certain security decisions. These security decisions are supportive in terms of distribution of restricted resources, stability of professed problems and consideration of core inducement mechanisms. In game theoretical model, more than one person are involved in the decision making process and examining the decisions made where players are either directly or indirectly involved to share the resources provided in the game. Games relevant to the strategic security can be simple or complex. The game can be helpful in solving the simple as well as complex formulated security issues. The security issues can be related to the wireless or computer controlled communication programs. The strategy can provide a solution of the user privacy issues, etc. Utilizing this theoretical model, a defender keeps maintaining the security of the network and the system, while an attacker always tries to access the secure

No comments:

Post a Comment