Thursday, April 25, 2019
LitReview Essay Example | Topics and Well Written Essays - 1750 words
LitReview - Essay Example rumination of a threat doles reveal as a restriction or limitation that creates hindrances to perform unavoidable tasks as it dissuades to take carry through considering losses and costs. The whole process crowd out be seen as a military action in which, concerned parties ar restricted to take any military action that would affect the foreign policy objectives of the two involved states. Any sort of initiation of combating action is deterred. sharp choice theory is another theory that is influential in terms of cyber aegis. This theory allows contemplation and differentiation of varied accessible tactics. Cornish & Clarke (1986) inform that this theory emerged considering a notion related to cost gain analysis. For example, a criminal conducts a crime when it appears advantageous to him. The theory also puts light on competitions haziness towards defenders selected option. Nevertheless, the theory fails to resolve the strategized relationship betwe en concerned parties, which ar thoroughly reviewed in granular theory (Understanding Society, 2008). The challengers select their intended defenders diligently and also work on their combating strategies considering previously employed strategies by the defenders. According to Cavusoglu, Raghunathan & Yue (2008), Decision theory is weak in handling the challengers worked out strategies and revisiting of defenders actions because as per the theory, defender regards challengers devised performances as exogenous. According to the game theory, defenders choices and challengers actions are endogenous. According to the decision theory, the scenarios according to which, the involved parties realise to take action are predefined due to which, the actions performed by actors are regarded exogenous. Von Newmann and Morgenstern (1944) inform that each contestant is qualified to evaluate variables of his actions only. There are rational rules involved in considering of variables and compreh ension of variables of others actions, which cannot be determined statistically. Therefore, it has been required to explore a more viable theory that can be apply to cyber surety. Researchers have moved towards game theory to comprehend the relationship between actors in cyber security issues. In addition, Nisan and Ronen (1999), Nisan (2007) inform about mechanism design that has assisted towards development of protection and privacy mechanisms. These mechanisms are designed with the support of systematic results. Because of usage of game theory, there are certain security decisions. These security decisions are supportive in terms of distribution of restricted resources, stability of professed problems and consideration of core inducement mechanisms. In game theoretical model, more than one person are involved in the decision qualification process and examining the decisions made where players are either directly or indirectly involved to share the resources provided in the gam e. Games relevant to the strategic security can be simple or complex. The game can be helpful in solving the simple as well as complex formulated security issues. The security issues can be related to the wireless or computer controlled communication programs. The strategy can provide a solution of the user privacy issues, etc. Utilizing this theoretical model, a defender keeps maintaining the security of the network and the system, while an attacker always tries to access the secure
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.