115
From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith Memorial Professor and Director of the Virtual Center for Supernetworks Isenberg School of Management University of Massachusetts Amherst, Massachusetts 01003 MITRE Corporation Bedford, Massachusetts March 14, 2016 Anna Nagurney Cybercrime and Cybersecurity

From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

From Cybercrime in Financial Services toCybersecurity Investments and Network

Vulnerability

Anna Nagurney

John F. Smith Memorial Professor and Director of the Virtual Center forSupernetworks

Isenberg School of ManagementUniversity of Massachusetts

Amherst, Massachusetts 01003

MITRE CorporationBedford, Massachusetts

March 14, 2016

Anna Nagurney Cybercrime and Cybersecurity

Page 2: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

I’d like to thank Dr. Les Servi for the invitation to speak with you.

I acknowledge support for some of the research in this presentationprovided by the Advanced Cyber Security Center (ACSC) and theNational Science Foundation (NSF) through the project:Collaborative Research: Network Innovation Through Choice,which envisions a Future Internet Architecture.

Special acknowledgments and thanks to my students andcollaborators who have made research and teaching alwaysstimulating and rewarding.

Anna Nagurney Cybercrime and Cybersecurity

Page 3: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Outline

I Background and Motivation

I Networks and Behavior

I Which Nodes and Links Really Matter?

I Game Theory

I A Network Economic Model of Cybercrime

I Multifirm Models of Cybersecurity Investment: Competitionvs. Cooperation

I Summary and Conclusions

Anna Nagurney Cybercrime and Cybersecurity

Page 4: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Background and Motivation

Anna Nagurney Cybercrime and Cybersecurity

Page 5: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

How I Became Interested in Cybersecurity

One of my books, written with a UMass Amherst alum, was“hacked” and digital copies of it posted on websites around theglobe.

In a sense, this may be viewed as a compliment since clearlysomeone had determined that it has some sort of value.

Anna Nagurney Cybercrime and Cybersecurity

Page 6: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The publisher John Wiley & Sons was notified and lawyers gotinvolved but how do you contact and then influence thoseresponsible for postings on rather anonymous websites?

About the same time news about cyberattacks was gettingprominent attention in the media and there were those interestedin working with us on related research on cybersecurity.

Anna Nagurney Cybercrime and Cybersecurity

Page 7: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Internet has transformed the waysin which individuals, groups,organizations communicate, obtaininformation, access entertainment, andconduct their economic and socialactivities.

70% of households and 94% ofbusinesses with 10 or moreemployees are online with animmense growth in mobile devicesand social media. In 2012, therewere over 2.4 billion users. In 2015,there were 3 billion users, almosthalf of the world population

Anna Nagurney Cybercrime and Cybersecurity

Page 8: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Cost of Cybercrime

According to the Center for Strategic and International Studies(2014), the world economy sustained $445 billion in losses fromcyberattacks in 2014. The United States suffered a loss of $100billion, Germany lost $60 billion, China lost $45 billion, and theUnited Kingdom reported a loss of $11.4 billion due tocybersecurity lapses.

The think tank also presented an analysis that indicated that ofthe $2 trillion to $3 trillion generated by the Internet annually,about 15%-20% is extracted by cybercrime.

Anna Nagurney Cybercrime and Cybersecurity

Page 9: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime

• Cybercrimes are costly for organizations. The Ponemon Institute(2015) reports that the average annualized cost of cybercrimeincurred by a benchmark sample of organizations was $15 million.The range of these annualized costs was $1.9 million to $65million, an 82% increase in the past six years.

• All industries fall victim to cybercrime, but to different degreeswith defense, energy and utilities, and financial service companiesexperiencing higher cybercrime costs than organizations in retail,hospitality, and consumer products.

Anna Nagurney Cybercrime and Cybersecurity

Page 10: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime

• Cybercrimes are costly for organizations. The Ponemon Institute(2015) reports that the average annualized cost of cybercrimeincurred by a benchmark sample of organizations was $15 million.The range of these annualized costs was $1.9 million to $65million, an 82% increase in the past six years.

• All industries fall victim to cybercrime, but to different degreeswith defense, energy and utilities, and financial service companiesexperiencing higher cybercrime costs than organizations in retail,hospitality, and consumer products.

Anna Nagurney Cybercrime and Cybersecurity

Page 11: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime

In 2014 alone, Target, Home Depot, Michaels Stores, Staples, andeBay were breached. Card data and personal information ofmillions of customers were stolen and the detection of cyberespionage became the prime focus for the retail sector with regardsto cybersecurity (The New York Times (2015)).

Since financial gains are one of the most attractive benefitsemerging from cyberattacks, financial service firms are targetedincessantly.

The large-scale data breach of JP Morgan Chase, Kaspersky Lab’sdetection of a two-year infiltration of 100 banks across the worldcosting $1 billion (USA Today (2015)), and the Dridex malwarerelated losses of $100 million worldwide (The Guardian (2015)) aresome of the widely accepted cautionary tales in this sector.

Anna Nagurney Cybercrime and Cybersecurity

Page 12: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime

More than 76 million households and seven million small businesseswere compromised because of JP Morgan attacks.

Clearly, hackers go where there is money.

Anna Nagurney Cybercrime and Cybersecurity

Page 13: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The most costly cybercrimes (58% annually) are those caused by denial of

service, malicious insider and web-based attacks. Mitigation may require

enabling technologies, intrusion prevention systems, applications security

testing solutions and enterprise solutions.

Source: Sarnowski for Booz Allen and Hamilton

Anna Nagurney Cybercrime and Cybersecurity

Page 14: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Putting Cybercrime in Context

Source: The Economic Impact of Cybercrime and Cyber Espionage,

Center for Strategic and International Studies, July 2013, sponsored by

McAfee.

Anna Nagurney Cybercrime and Cybersecurity

Page 15: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cyberattacks

Every minute, of every hour, of ever day, a major financialinstitution is under attack (Wilson in The Telegraph, October 6,2013).

Preparation, prediction, and protection are key - which are theweakest links?

Anna Nagurney Cybercrime and Cybersecurity

Page 16: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime and Financial Institutions

According to a recent survey cybercrime is placing heavy strains onthe global financial sector, with cybercrime now the second mostcommonly reported economic crime affecting financial servicesfirms.

Cybercrime accounted for 38% of all economic crimes in thefinancial sector, as compared to an average of 16% across all otherindustries.

Cyberattacks are intrusive and economically costly. In addition,they may adversely affect a company’s most valuable asset itsreputation.

Anna Nagurney Cybercrime and Cybersecurity

Page 17: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime and Financial Institutions

According to a recent survey cybercrime is placing heavy strains onthe global financial sector, with cybercrime now the second mostcommonly reported economic crime affecting financial servicesfirms.

Cybercrime accounted for 38% of all economic crimes in thefinancial sector, as compared to an average of 16% across all otherindustries.

Cyberattacks are intrusive and economically costly. In addition,they may adversely affect a company’s most valuable asset itsreputation.

Anna Nagurney Cybercrime and Cybersecurity

Page 18: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybercrime and Financial Institutions

According to a recent survey cybercrime is placing heavy strains onthe global financial sector, with cybercrime now the second mostcommonly reported economic crime affecting financial servicesfirms.

Cybercrime accounted for 38% of all economic crimes in thefinancial sector, as compared to an average of 16% across all otherindustries.

Cyberattacks are intrusive and economically costly. In addition,they may adversely affect a company’s most valuable asset itsreputation.

Anna Nagurney Cybercrime and Cybersecurity

Page 19: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

It’s About Risk Management

Source: Framework for Improving Critical Infrastructure Cybersecurity,

National Institute of Standards and Technology (NIST), February 12,

2014Anna Nagurney Cybercrime and Cybersecurity

Page 20: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Networks and Behavior

Anna Nagurney Cybercrime and Cybersecurity

Page 21: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Our enterprises and organizations are critically dependent oninfrastructure network systems including the Internet.

Anna Nagurney Cybercrime and Cybersecurity

Page 22: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Behavior on Congested Networks

Flows are routed so as to minimize total cost to society.

System-Optimized

Centralized Unselfish S–O

vs. vs. vs.��@@

@@��

��@@

@@��

Decentralized Selfish U–O

User-Optimized

Decision-makers select their cost-minimizing routes.

Anna Nagurney Cybercrime and Cybersecurity

Page 23: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Two fundamental principles of travel behavior, due to Wardrop(1952), with terms coined by Dafermos and Sparrow (1969).

User-optimized (U-O) (network equilibrium) Problem – each userdetermines his/her cost minimizing route of travel between anorigin/destination, until an equilibrium is reached, in which no usercan decrease his/her cost of travel by unilateral action (in thesense of Nash).

System-optimized (S-O) Problem – users are allocated among theroutes so as to minimize the total cost in the system, where thetotal cost is equal to the sum over all the links of the link’s usercost times its flow.

The U-O problems, under certain simplifying assumptions,possesses optimization reformulations. But now we can handle costasymmetries, multiple modes of transport, and different classes oftravelers, without such assumptions.

Anna Nagurney Cybercrime and Cybersecurity

Page 24: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

We Can State These Conditions Mathematically!

Anna Nagurney Cybercrime and Cybersecurity

Page 25: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The U-O and S-O Conditions

Definition: U-O or Network Equilibrium – Fixed DemandsA path flow pattern x∗, with nonnegative path flows and O/D pairdemand satisfaction, is said to be U-O or in equilibrium, if thefollowing condition holds for each O/D pair w ∈ W and each pathp ∈ Pw :

Cp(x∗)

{= λw , if x∗p > 0,≥ λw , if x∗p = 0.

Definition: S-O ConditionsA path flow pattern x with nonnegative path flows and O/D pairdemand satisfaction, is said to be S-O, if for each O/D pairw ∈ W and each path p ∈ Pw :

C ′p(x)

{= µw , if xp > 0,≥ µw , if xp = 0,

where C ′p(x)=

∑a∈L

∂ca(fa)∂fa

δap, and µw is a Lagrange multiplier.

Anna Nagurney Cybercrime and Cybersecurity

Page 26: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The importance of behavior will now be illustrated through afamous example known as the Braess paradox which demonstrateswhat can happen under U-O as opposed to S-O behavior.

Although the paradox was presented in the context oftransportation networks, it is relevant to other network systems inwhich decision-makers act in a noncooperative (competitive)manner.

Anna Nagurney Cybercrime and Cybersecurity

Page 27: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Braess (1968) Paradox

Assume a network with a singleO/D pair (1,4). There are 2paths available to travelers:p1 = (a, c) and p2 = (b, d).

For a travel demand of 6, theequilibrium path flows arex∗p1

= x∗p2= 3 and

The equilibrium path travel costisCp1 = Cp2 = 83.

� ��4

� ��2

@@

@@@R

c

� ��3

��

��

d

� ��1

��

��

a

@@

@@@R

b

ca(fa) = 10fa, cb(fb) = fb + 50,

cc(fc) = fc +50, cd(fd) = 10fd .

Anna Nagurney Cybercrime and Cybersecurity

Page 28: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Adding a Link Increases Travel Cost for All!

Adding a new link creates a newpath p3 = (a, e, d).

The original flow distributionpattern is no longer anequilibrium pattern, since at thislevel of flow the cost on pathp3,Cp3 = 70.

The new equilibrium flow patternnetwork isx∗p1

= x∗p2= x∗p3

= 2.

The equilibrium path travel cost:Cp1 = Cp2 = Cp3 = 92.

� ��4

� ��2

@@

@@@R

c

� ��3

��

��

d

-e

� ��1

��

��

a

@@

@@@R

b

ce(fe) = fe + 10

Anna Nagurney Cybercrime and Cybersecurity

Page 29: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The 1968 Braess article has been translated from German toEnglish and appears as:

On a Paradox of Traffic Planning,

Dietrich Braess, Anna Nagurney, and Tina Wakolbinger,Transportation Science 39 (2005), pp 446-450.

Anna Nagurney Cybercrime and Cybersecurity

Page 30: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Under S-O behavior, the total cost in the network isminimized, and the new route p3, under the samedemand, would not be used.

The Braess paradox never occurs in S-O networks.

Anna Nagurney Cybercrime and Cybersecurity

Page 31: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Other Networks that Behave like Traffic Networks

The Internet and electric power networks and even supply chains!

Anna Nagurney Cybercrime and Cybersecurity

Page 32: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Which Nodes and Links Really Matter?

Anna Nagurney Cybercrime and Cybersecurity

Page 33: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Empirical Evidence: Jan. 1994 - Dec. 1996 - Connectivity,Vulnerability

Granger Causality Results: Green Broker, Red Hedge Fund, BlackInsurer, Blue Bank Source: Billio, Getmansky, Lo, and Pelizzon (2011)

Anna Nagurney Cybercrime and Cybersecurity

Page 34: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Empirical Evidence: Jan. 2006 - Dec. 2008 - Connectivity,Vulnerability

Granger Causality Results: Green Broker, Red Hedge Fund, BlackInsurer, Blue Bank Source: Billio, Getmansky, Lo, and Pelizzon (2011)

Anna Nagurney Cybercrime and Cybersecurity

Page 35: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Financial Network Model

Demand MarketsMarkets for real estate loans, household loans, business loans, etc.

m1 m· · · j · · · mn mn+1

Sources of Financial FundsBusinesses, households, etc.

IntermediariesBanks, etc.

Non-investment Node

Internet Links

Internet Links

Physical Links

Physical Links

m1 m· · · i · · · mm

m1 m· · · k · · · mo??

��

��

���

������

@@

@@R?

��

��

PPPPPPPPPPPq

HHH

HHHHHj

@@

@@R

?

��

��

�����������)

@@

@@R?

���������

HHHHHHHHj

@@

@@R

��

��

PPPPPPPPPPPq

HHHHHHHHj?

Figure 1: The Structure of the Financial Network with Intermediation

Anna Nagurney Cybercrime and Cybersecurity

Page 36: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Nagurney and Qiang (N-Q) Network PerformanceMeasure

Definition: A Unified Network Performance MeasureThe network performance/efficiency measure, E(G , d), for a givennetwork topology G and the equilibrium (or fixed) demand vectord, is:

E = E(G , d) =

∑w∈W

dwλw

nW,

where recall that nW is the number of O/D pairs in the network,and dw and λw denote, for simplicity, the equilibrium (or fixed)demand and the equilibrium disutility for O/D pair w, respectively.

Anna Nagurney and Qiang Qiang, A Network Efficiency Measure with

Application to Critical Infrastructure Networks, Journal of Global

Optimization 40 (2008), pp 261-275.

Anna Nagurney Cybercrime and Cybersecurity

Page 37: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Importance of Nodes and Links

Definition: Importance of a Network ComponentThe importance of a network component g ∈ G, I (g), is measuredby the relative network efficiency drop after g is removed from thenetwork:

I (g) =4EE

=E(G , d)− E(G − g , d)

E(G , d)

where G − g is the resulting network after component g isremoved from network G.

Anna Nagurney Cybercrime and Cybersecurity

Page 38: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Approach to Identifying the Importance of NetworkComponents

The elimination of a link is treated in the N-Q network efficiencymeasure by removing that link while the removal of a node ismanaged by removing the links entering and exiting that node.

In the case that the removal results in no path connecting an O/Dpair, we simply assign the demand for that O/D pair to an abstractpath with a cost of infinity.

The N-Q measure is well-defined even in the case ofdisconnected networks.

Anna Nagurney Cybercrime and Cybersecurity

Page 39: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Ranking of Links in the Braess Network

Table 1: Link Results for the Braess Network

N-Q Measure L-M MeasureImportance Importance Importance Importance

Link Value Ranking Value Ranking

a .2069 1 .1056 3

b .1794 2 .2153 2

c .1794 2 .2153 2

d .2069 1 .1056 3

e -.1084 3 .3616 1

N-Q (Nagurney-Qiang); L-M (Latora-Marchiori)

Anna Nagurney Cybercrime and Cybersecurity

Page 40: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Ranking of Nodes in the Braess Network

Table 2: Nodal Results for the Braess Network

N-Q Measure L-M MeasureImportance Importance Importance Importance

Node Value Ranking Value Ranking

1 1.0000 1 — —

2 .2069 2 .7635 1

3 .2069 2 .7635 1

4 1.0000 1 — —

Anna Nagurney Cybercrime and Cybersecurity

Page 41: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Advantages of the N-Q Network Efficiency Measure

• The measure captures demands, flows, costs, and behavior ofusers, in addition to network topology.

• The resulting importance definition of network components isapplicable and well-defined even in the case of disconnectednetworks.

• It can be used to identify the importance (and ranking) of eithernodes, or links, or both.

• It can be applied to assess the efficiency/performance of a widerange of network systems, including financial systems and supplychains under risk and uncertainty.

• It is applicable also to elastic demand networks.

• It is applicable to dynamic networks, including the Internet.

Anna Nagurney Cybercrime and Cybersecurity

Page 42: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Financial Networks and Game Theory

Anna Nagurney Cybercrime and Cybersecurity

Page 43: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Game Theory

Anna Nagurney Cybercrime and Cybersecurity

Page 44: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Game Theory

There are many game theory problems and tools for solving suchproblems. There is noncooperative game theory, in which theplayers or decision-makers compete with one anther, andcooperative game theory, in which players cooperate with oneanother.

John F. Nash

In noncooperative games, the governing concept is that of Nashequilibrium. In cooperative games, we can apply Nash bargainingtheory.

Anna Nagurney Cybercrime and Cybersecurity

Page 45: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Game Theory

Game theory is very useful.

In order to set up a game theory model, you need to identify theplayers, their strategic variables (strategies), the constraints ontheir strategies, and their pay-off functions.

Pay-off functions can be profit functions, for example.

Anna Nagurney Cybercrime and Cybersecurity

Page 46: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Network Economic Model of Cybercrime

Anna Nagurney Cybercrime and Cybersecurity

Page 47: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

We lay the foundation for the development of network economicsbased models for cyberccrime in financial services.

Financial services firms as well as hackers are economic agents.

Our view is that financial firms produce/possess commodities (orproducts) that hackers (criminals) seek to obtain.

We assume that the firms (as well as the hackers) can be locatedin different regions of a country or in different countries. Financialservice firms may also be interpreted as prey and the hackers aspredators.

Anna Nagurney Cybercrime and Cybersecurity

Page 48: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

Commodities or products that the hackers seek to acquire mayinclude: credit card numbers, password information, specificdocuments, etc.

The financial firms are the producers of these commodities whereasthe hackers act as agents and “sell” these products, if they acquirethem, at the “going” market prices.

There is a “price” at which the hackers acquire the financialcommodity from a financial institution and a price at which theysell the hacked product in the demand markets. The former werefer to as the supply price and the latter is the demand price.

Anna Nagurney Cybercrime and Cybersecurity

Page 49: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

In addition, we assume that there is a transaction cost associatedbetween each pair of financial and demand markets for eachcommodity. These transaction costs can be generalized costs thatalso capture risk.

Anna Nagurney Cybercrime and Cybersecurity

Page 50: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

Indeed, if the cyber criminals do not find demand markets for theiracquired financial commodities (since there are no consumerswilling to pay the price) then there is no economic incentive forthem to acquire the financial commodities.

To present another criminal network analogue – consider themarket for illegal drugs, with the U.S. market being one of thelargest, if not the largest one. If there is no demand for the drugsthen the suppliers of illegal drugs cannot recover their costs ofproduction and transaction and the flows of drugs will go to zero.

According to a recent Rand report, for many, the cyber blackmarket can be more profitable than the illegal drug trade.

Anna Nagurney Cybercrime and Cybersecurity

Page 51: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

Indeed, if the cyber criminals do not find demand markets for theiracquired financial commodities (since there are no consumerswilling to pay the price) then there is no economic incentive forthem to acquire the financial commodities.

To present another criminal network analogue – consider themarket for illegal drugs, with the U.S. market being one of thelargest, if not the largest one. If there is no demand for the drugsthen the suppliers of illegal drugs cannot recover their costs ofproduction and transaction and the flows of drugs will go to zero.

According to a recent Rand report, for many, the cyber blackmarket can be more profitable than the illegal drug trade.

Anna Nagurney Cybercrime and Cybersecurity

Page 52: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

Indeed, if the cyber criminals do not find demand markets for theiracquired financial commodities (since there are no consumerswilling to pay the price) then there is no economic incentive forthem to acquire the financial commodities.

To present another criminal network analogue – consider themarket for illegal drugs, with the U.S. market being one of thelargest, if not the largest one. If there is no demand for the drugsthen the suppliers of illegal drugs cannot recover their costs ofproduction and transaction and the flows of drugs will go to zero.

According to a recent Rand report, for many, the cyber blackmarket can be more profitable than the illegal drug trade.

Anna Nagurney Cybercrime and Cybersecurity

Page 53: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

• After the major Target breach, credit cards obtained thus initiallysold for $120 each on the black market, but, within weeks, asbanks started to cancel the cards, the price dropped to $8 and,seven months after Target learned about the breach, the cards hadessentially no value.

• In addition, different brands of credit cards can be viewed asdifferent products since they command different prices on the blackmarket. For example, according to Leinwand Leger (2014) creditcards with the highest credit limits, such as an American ExpressPlatinum card, command the highest prices.

• A card number with a low limit might sell for $1 or $2, while ahigh limit card number can sell for $15 or considerably more, asnoted above. Hacked credit card numbers of European credit cardscan command prices five times higher than U.S. cards (seePeterson (2013)).

Anna Nagurney Cybercrime and Cybersecurity

Page 54: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

• After the major Target breach, credit cards obtained thus initiallysold for $120 each on the black market, but, within weeks, asbanks started to cancel the cards, the price dropped to $8 and,seven months after Target learned about the breach, the cards hadessentially no value.

• In addition, different brands of credit cards can be viewed asdifferent products since they command different prices on the blackmarket. For example, according to Leinwand Leger (2014) creditcards with the highest credit limits, such as an American ExpressPlatinum card, command the highest prices.

• A card number with a low limit might sell for $1 or $2, while ahigh limit card number can sell for $15 or considerably more, asnoted above. Hacked credit card numbers of European credit cardscan command prices five times higher than U.S. cards (seePeterson (2013)).

Anna Nagurney Cybercrime and Cybersecurity

Page 55: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Network Economics of Cybercrime

• After the major Target breach, credit cards obtained thus initiallysold for $120 each on the black market, but, within weeks, asbanks started to cancel the cards, the price dropped to $8 and,seven months after Target learned about the breach, the cards hadessentially no value.

• In addition, different brands of credit cards can be viewed asdifferent products since they command different prices on the blackmarket. For example, according to Leinwand Leger (2014) creditcards with the highest credit limits, such as an American ExpressPlatinum card, command the highest prices.

• A card number with a low limit might sell for $1 or $2, while ahigh limit card number can sell for $15 or considerably more, asnoted above. Hacked credit card numbers of European credit cardscan command prices five times higher than U.S. cards (seePeterson (2013)).

Anna Nagurney Cybercrime and Cybersecurity

Page 56: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Perishability and Cybercrime in Financial Products

There is a short time window during which the value of a financialproduct acquired through cybercrime is positive but it decreasesduring the time window. Hence, financial products such as creditcards that are hacked can be treated as perishable products suchas fruits, vegetables, etc.

Anna Nagurney Cybercrime and Cybersecurity

Page 57: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Perishability and Cybercrime in Financial Products

This part of the presentation is based on the paper, AMultiproduct Network Economic Model of Cybercrime in FinancialServices, Anna Nagurney, Service Science 7(1) (2015) pp 70-81.

Anna Nagurney Cybercrime and Cybersecurity

Page 58: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Perishability and Cybercrime in Financial Products

j j j

j j j

1 2 · · · n

1 2 · · · m

Demand Markets

Source Locations

?

AAAAAAU

QQ

QQ

QQ

QQQs

��

��

��� ?

@@

@@

@@R?

��

��

��

��

��

��

���+

Product 1

j j j

j j j

1 2 · · · n

1 2 · · · m

Source Locations

Demand Markets

?

AAAAAAU

QQ

QQ

QQ

QQQs

��

��

��� ?

@@

@@

@@R?

��

��

��

��

��

��

���+

Product o

··

··

··

·

··

··

··

·

Figure 2: Structure of the Network Economic ProblemAnna Nagurney Cybercrime and Cybersecurity

Page 59: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Some Notation - Variables

Let Qkij denote the nonnegative amount of financial product k

obtained from i and shipped to j .

Let ski denote the nonnegative supply of financial product k at i

and let dkj be the demand for k and j .

T kij is the time between the acquisition of product k from source

location i and its sale at j .

T kave,j is the average time for delivery of product k at demand

market j , where T kave,j =

Pmi=1 T k

ij Qkij

dkj

.

Anna Nagurney Cybercrime and Cybersecurity

Page 60: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Some Notation - Functions

Let πki (s) denote the price of acquiring product k at source

location i .

Let ρkj (d ,Tave) denote the demand price of financial product k at

demand market j .

Let ckij (Q) denote the unit transaction cost associated with

transacting product k between i and j .

Anna Nagurney Cybercrime and Cybersecurity

Page 61: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Conservation of Flow Equations

The conservation of flow equations are:

ski =

n∑j=1

Qkij , k = 1, . . . , o; i = 1, . . . ,m,

dkj =

m∑i=1

Qkij , k = 1, . . . , o; i = 1, . . . , n,

Qkij ≥ 0, k = 1, . . . , o; i = 1, . . . ,m; j = 1, . . . , n.

In addition, we introduce the following expression, which capturestime:

tkij Q

kij + hk

ij = T kij , k = 1, . . . , o; i = 1, . . . ,m; j = 1, . . . , n, (4)

Anna Nagurney Cybercrime and Cybersecurity

Page 62: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

In view of the conservation of flow equations, we can define newdemand price functions ρk

j , ∀k,∀j as follows:

ρkj (Q) ≡ ρk

j (d ,Tave), k = 1, . . . , o; j = 1, . . . , n.

If the demand at a demand market for a product is equal to zero,we remove that demand market from the network for that productsince the corresponding time average would not be defined.

Also, we can define new supply price functions πki , ∀k,∀i as:

πki (Q) ≡ πk

i (s), k = 1, . . . , o; j = 1, . . . , n,

which allow us to construct a variational inequality formulationgoverning the equilibrium conditions below with nice features forcomputations. We assume that all the functions in the model arecontinuous.

Anna Nagurney Cybercrime and Cybersecurity

Page 63: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Network Economic Equilibrium Conditions

The network economic equilibrium conditions for cybercrime havebeen achieved if for all products k; k = 1, . . . , o, and for all pairsof markets (i , j); i = 1, . . . ,m; j = 1, . . . , n, the followingconditions hold:

πki (Q∗) + ck

ij (Q∗)

{= ρk

j (Q∗), if Qkij∗

> 0

≥ ρkj (Q∗), if Qk

ij∗

= 0,

where recall that πki denotes the price of product k at source

location i , ckij denotes the unit transaction cost associated with k

between (i , j), and ρkj is the demand price of k at demand market

j . Qkij∗

is the equilibrium flow of product k between i and j withQ∗ being the vector of all such flows.

We define the feasible set K ≡ {Q|Q ∈ Romn+ }.

Anna Nagurney Cybercrime and Cybersecurity

Page 64: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

VI Formulation of the Equilibrium Conditions

Theorem: Variatinal Inequality FormulationA product flow pattern Q∗ ∈ K is a cybercrime network economicequilibrium if and only if it satisfies the variational inequalityproblem:

o∑k=1

m∑i=1

n∑j=1

[πk

i (Q∗) + ckij (Q

∗)− ρkj (Q∗)

]×(Qk

ij−Qkij∗) ≥ 0, ∀Q ∈ K .

The above variational inequality problem can be put into standardform (see Nagurney (1999)): determine X ∗ ∈ K, such that

〈F (X ∗),X − X ∗〉 ≥ 0, ∀X ∈ K.

We define K ≡ K , X ≡ Q, and F (X ) ≡ (Fkij(X )); k = 1, . . . , o;i = 1, . . . ,m; j = 1, . . . , n, where Fkij = πk

i (Q) + ckij (Q)− ρk

j (Q).

Anna Nagurney Cybercrime and Cybersecurity

Page 65: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Algorithm

The Euler MethodAt each iteration τ one solves the following problem:

X τ+1 = PK(X τ − aτF (X τ )),

where PK is the projection operator.

As shown in Dupuis and Nagurney (1993) and Nagurney andZhang (1996), for convergence of the general iterative scheme,which induces the Euler method, among other methods, thesequence {aτ} must satisfy:

∑∞τ=0 aτ = ∞, aτ > 0, aτ → 0, as

τ →∞.

Explicit FormulaeIn particular, we have the following closed form expression for theproduct flows k = 1, . . . ,m; i = 1, . . . ,m; j = 1, . . . , n:

Qkij

τ+1= max{0,Qk

ijτ

+ aτ (ρkj (Qτ )− ck

ij (Qτ )− πk

i (Qτ )}.

Anna Nagurney Cybercrime and Cybersecurity

Page 66: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Numerical Examples: 2 Financial Products, 2 SupplyMarkets, and 2 Demand Markets

The network topology of the examples is as in Figure 3.

Demand Markets

����1 ����

2

?

@@

@@@R?

��

���

1���� ����2

CreditCard 1

����1 ����

2

?

@@

@@@R?

��

���

1���� ����2

CreditCard 2

Supply Locations

Figure 3: Topology of Examples

Anna Nagurney Cybercrime and Cybersecurity

Page 67: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Numerical Examples: 2 Financial Products, 2 SupplyMarkets, and 2 Demand Markets

Example 1 The supply price functions are:

π11(s) = 5s1

1 + s12 + 2, π1

2(s) = 2s12 + s1

1 + 1,

π21(s) = 2s2

1 + s11 + 1, π2

2(s) = s22 + .5s1

2 + 1.

The unit transaction cost functions are:

c11 (Q) = .03Q1

112+ 3Q1

11 + 1, c121(Q) = .02Q1

212+ 2Q1

21 + 2,

c211(Q) = .01Q2

112+ Q2

11 + 1, c121(Q) = .001Q2

212+ .1Q2

21 + 1,

c112(Q) = .01Q1

122+ Q1

12 + 1, c122(Q) = .01Q1

222+ Q1

22 + 1,

c212(Q) = .01Q2

122+ Q2

12 + 1, c222(Q) = .02Q2

222+ 2Q2

22 + 2,

and the demand price functions are:

ρ1(1) = −2d11−d2

1−.5T 1ave,1+500, ρ2

1(d) = −3d21−d1

1−.1T 2ave,1+300,

ρ12(d ,Tave) = −d1

2−.5d22−.2T 1

ave,2+200, ρ22(d ,Tave) = −2d2

2−d12−.1T 2

ave,2+100.

Anna Nagurney Cybercrime and Cybersecurity

Page 68: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Numerical Examples: 2 Financial Products, 2 SupplyMarkets, and 2 Demand Markets

Example 1 The time expressions are:

T 111 = .1Q1

11 + 10, T 121 = .5Q1

21 + 5,

T 211 = .1Q2

11 + 20, T 221 = .5Q2

21 + 15,

T 112 = .1Q1

12 + 10, T 122 = .1Q1

22 + 10,

T 212 = .5Q2

12 + 5, T 222 = .5Q2

22 + 10,

so that

T 1ave,1 =

T 111Q

111 + T 1

21Q121

d11

, T 2ave,1 =

T 211Q

211 + T 2

21Q221

d21

.

T 1ave,2 =

T 112Q

112 + T 1

22Q122

d12

, T 2ave,2 =

T 212Q

212 + T 2

22Q222

d22

.

The Euler method converged to the solution reported in Tables 1and 2.

Anna Nagurney Cybercrime and Cybersecurity

Page 69: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Example 2

Example 2Example 2 has the same data as Example 1 except that now wehave a modification in the demand price function associated withthe second product at demand market 2 so that:

ρ22(d ,Tave) = −2d2

2 − d12 − .1T 2

ave,2 + 200.

Such a change might represent that the value of this financialproduct has increased at that demand market.

Anna Nagurney Cybercrime and Cybersecurity

Page 70: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Example 3

Example 3Example 3 was constructed from Example 2 and had the samedata except that we increased the fixed terms in all the transactioncost functions so that:

c11 (Q) = .03Q1

112+ 3Q1

11 + 10, c121(Q) = .02Q1

212+ 2Q1

21 + 20,

c211(Q) = .01Q2

112+ Q2

11 + 10, c121(Q) = .001Q2

212+ .1Q2

21 + 10,

c112(Q) = .01Q1

122+ Q1

12 + 10, c122(Q) = .01Q1

222+ Q1

22 + 10,

c212(Q) = .01Q2

122+ Q2

12 + 10, c222(Q) = .02Q2

222+ 2Q2

22 + 20.

This could represent the situation that the cybercriminals have aharder time fencing all the products at all the demand markets.The results are reported in Tables 1 and 2.

Anna Nagurney Cybercrime and Cybersecurity

Page 71: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Results

Table 3: Equilibrium Solutions for the Examples

Financial Flows Example 1 Example 2 Example 3

Q111∗

25.93 26.31 26.21

Q112∗

0.00 0.00 0.00

Q121∗

46.73 48.28 46.45

Q122∗

16.77 12.50 11.61

Q211∗

11.69 4.81 3.47

Q212∗

6.09 23.46 23.59

Q221∗

37.56 39.27 39.57

Q222∗

0.00 12.67 9.69

Anna Nagurney Cybercrime and Cybersecurity

Page 72: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Results

Table 4: Incurred Equilibrium Prices and Average Times

Prices Example 1 Example 2 Example 3ρ11(d

∗,T ∗ave) 294.07 295.07 300.35

ρ21(d

∗,T ∗ave) 76.52 89.85 94.87

ρ12(d

∗,T ∗ave) 175.51 164.94 167.28

ρ22(d

∗,T ∗ave) 69.98 113.86 120.52

Average Times Example 1 Example 2 Example 3T 1

ave,1 22.74 23.32 22.59

T 2ave,1 30.78 33.09 33.62

T 1ave,2 23.35 22.50 22.32

T 2ave,2 10.61 13.75 13.08

Anna Nagurney Cybercrime and Cybersecurity

Page 73: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Managerial Insights

• The above numerical examples, although stylized, provideimportant managerial insights that cybersecurity professionals maytake advantage of in securing their data.

• The examples show the quantified impacts of changes in thedata on the equilibrium financial product flows, and on theincurred demand prices and average times for product delivery.

• The results are consistent with existing data on hacked creditcards. For example, Goncharov (2012) reports that the cost, thatis, the supply price, of hacking into various accounts can rangeanywhere from $16 to over $325. Also, as reported in Ablon,Libicki, and Golay (2014), following an initial breach, the marketsmay get flooded with cybercrime products leading to a decrease inprices, which the structure of our demand price functions capture.

Anna Nagurney Cybercrime and Cybersecurity

Page 74: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Managerial Insights

• The above numerical examples, although stylized, provideimportant managerial insights that cybersecurity professionals maytake advantage of in securing their data.

• The examples show the quantified impacts of changes in thedata on the equilibrium financial product flows, and on theincurred demand prices and average times for product delivery.

• The results are consistent with existing data on hacked creditcards. For example, Goncharov (2012) reports that the cost, thatis, the supply price, of hacking into various accounts can rangeanywhere from $16 to over $325. Also, as reported in Ablon,Libicki, and Golay (2014), following an initial breach, the marketsmay get flooded with cybercrime products leading to a decrease inprices, which the structure of our demand price functions capture.

Anna Nagurney Cybercrime and Cybersecurity

Page 75: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Managerial Insights

• The above numerical examples, although stylized, provideimportant managerial insights that cybersecurity professionals maytake advantage of in securing their data.

• The examples show the quantified impacts of changes in thedata on the equilibrium financial product flows, and on theincurred demand prices and average times for product delivery.

• The results are consistent with existing data on hacked creditcards. For example, Goncharov (2012) reports that the cost, thatis, the supply price, of hacking into various accounts can rangeanywhere from $16 to over $325. Also, as reported in Ablon,Libicki, and Golay (2014), following an initial breach, the marketsmay get flooded with cybercrime products leading to a decrease inprices, which the structure of our demand price functions capture.

Anna Nagurney Cybercrime and Cybersecurity

Page 76: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Managerial Insights

• Credit cards acquired in the Target breach initially fetched from$20 to $135 depending on the type of card, expiration date as wellas limit (cf. Ablon, Libicki, and Golay (2014)). Although ournumerical study did not focus on a specific historical data breach,the results are not inconsistent with results obtained in practice.

• Finally, the model captures the crucial time element in thedemand market pricing of products obtained through cybercrimewith a focus on financial services.

Anna Nagurney Cybercrime and Cybersecurity

Page 77: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Managerial Insights

• Credit cards acquired in the Target breach initially fetched from$20 to $135 depending on the type of card, expiration date as wellas limit (cf. Ablon, Libicki, and Golay (2014)). Although ournumerical study did not focus on a specific historical data breach,the results are not inconsistent with results obtained in practice.

• Finally, the model captures the crucial time element in thedemand market pricing of products obtained through cybercrimewith a focus on financial services.

Anna Nagurney Cybercrime and Cybersecurity

Page 78: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Multifirm Models of Cybersecurity InvestmentCompetition vs. Cooperation

Anna Nagurney Cybercrime and Cybersecurity

Page 79: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Multifirm Models of Cybersecurity Investment

This part of the presentation is based on the paper, MultifirmModels of Cybersecurity Investment Competition vs. Cooperationand Network Vulnerability, Anna Nagurney and Shivani Shukla,where many references and additional theoretical and numericalresults can be found.

Anna Nagurney Cybercrime and Cybersecurity

Page 80: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Investing in Cybersecurity

There is a growing interest in developing rigorous frameworks forcybersecurity investments.

As reported in Glazer (2015), JPMorgan was expected to doubleits cybersecurity spending in 2015 to $500 million from $250million in 2015.

According to Purnell (2015), the research firm Gartner reported inJanuary 2015 that the global information security spending wouldincrease by 7.6% in 2015 to $790 billion and by 36% by 2018 to$101 billion.

It is clear that making the best cybersecurity investments is a verytimely problem and issue.

Anna Nagurney Cybercrime and Cybersecurity

Page 81: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

We describe three different models of multifirm cybersecurityinvestments.

The first model is a Nash Equilibrium (NE) one capturingnoncooperative behavior; the second and third are cooperativemodels, using Nash Bargaining (NB) and System-Optimization(S-O) concepts, respectively.

We assume that there are m firms in the “network.” These firmscan be financial service firms, energy firms, manufacturing firms, oreven retailers.

Each firm i ; i = 1, . . . ,m, in the network is interested indetermining how much it should invest in cybsecurity with thecybersecurity level or, simply, security level of firm i denoted, wlog,by si ; i = 1 . . . , m.

Anna Nagurney Cybercrime and Cybersecurity

Page 82: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

The cybersecurity level si of each firm i must satisfy the followingconstraint:

0 ≤ si ≤ usi , i = 1, . . . ,m,

where usi <1, and is also greater than zero, is the upper bound onthe security level for firm i .

A value of a cybersecurity level of 1 would imply perfect security,which is not achievable. When si = 0 the firm has no security. Wegroup the security levels of all firms into the m-dimensional vectors.

Anna Nagurney Cybercrime and Cybersecurity

Page 83: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

In order to attain security level si , firm i encumbers an investmentcost hi (si ) with the function assumed to be continuouslydifferentiable and convex.

For a given firm i , hi (0) = 0 denotes an entirely insecure firm andhi (1) = ∞ is the investment cost associated with complete securityfor the firm, as in Shetty et al. (2009) and Shetty (2010). Anexample of a suitable hi (si ) function that we use in this paper is

hi (si ) = αi (1√

(1− si )− 1)

with αi > 0. Such a function was utilized in Nagurney andNagurney (2015), in Nagurney, Nagurney, and Shukla (2015), andin Nagurney, Daniele, and Shukla (2015).

Anna Nagurney Cybercrime and Cybersecurity

Page 84: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

The network security level, s, is the average security, given by:

s =1

m

m∑j=1

sj .

The vulnerability of firm i , vi = (1− si ), and the networkvulnerability, v = (1− s).

Anna Nagurney Cybercrime and Cybersecurity

Page 85: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

Following Shetty (2010), the probability pi of a successful attackon firm i ; i = 1, . . . ,m is

pi = (1− si )(1− s), i = 1, . . . ,m,

where (1− s) is the probability of an attack on the network and(1− si ) is the probability of success of such an attack on firm i .

Anna Nagurney Cybercrime and Cybersecurity

Page 86: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

Each firm i ; i = 1, . . . ,m has a utility associated with its wealthWi , denoted by fi (Wi ), which is increasing, and is continuous andconcave. The form of the fi (Wi ) that we use is

√W i (see Shetty

et al. (2009)). Such a function is increasing, continuous, andconcave.

Also, a firm i is faced with damage Di if there is a successfulcyberattack on it.

Anna Nagurney Cybercrime and Cybersecurity

Page 87: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Common Features of the Models

The expected utility E (Ui ) of firm i ; i = 1, . . . ,m, is given by theexpression:

E (Ui ) = (1− pi )fi (Wi ) + pi (fi (Wi − Di ))− hi (si ).

We may write E (Ui ) = E (Ui (s)),∀i . Each E (Ui (s)) is strictlyconcave with respect to si under the assumed functional formsabove since we also know that each hi (si ); i = 1, . . . ,m is strictlyconvex.

Anna Nagurney Cybercrime and Cybersecurity

Page 88: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Nash Equilibrium Model of Cybersecurity Investments

We seek to determine a security level pattern s∗ ∈ K 1, whereK 1 =

∏mi=1 K 1

i and K 1i ≡ {si |0 ≤ si ≤ usi}, such that the firms

will be in a state of equilibrium with respect to their cybersecuritylevels. K 1 is convex since it is a Cartesian product of the firms’feasible sets with each such set being convex since it correspondsto box-type constraints.

Definition: Nash Equilibrium in Cybersecurity LevelsA security level pattern s∗ ∈ K 1 is said to constitute acybersecurity level Nash equilibrium if for each firm i ; i = 1, . . . ,m:

E (Ui (s∗i , s∗i )) ≥ E (Ui (si , s

∗i )), ∀si ∈ K 1

i ,

wheres∗i ≡ (s∗1 , . . . , s∗i−1, s

∗i+1, . . . , s

∗m).

Anna Nagurney Cybercrime and Cybersecurity

Page 89: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

VI Formulation of the NE Model

Theorem: Variational Inequality Formulation of NashEquilibrium in Cybersecurity LevelsSince for each firm i; i = 1, . . . ,m the expected profit functionE (Ui (s)) is concave with respect to the variable si , and iscontinuously differentiable, and the feasible set K 1 is convex, weknow that s∗ ∈ K 1 is a Nash equilibrium in cybersecurity levelsaccording to the Definition if and only if it satisfies the VI

−m∑

i=1

∂E (Ui (s∗))

∂si× (si − s∗i ) ≥ 0, ∀s ∈ K 1;

or, if and only if it satisfies the VI

m∑i=1

∂hi (s∗i )

∂si+ [fi (Wi )− fi (Wi − Di )]

1

m

m∑j=1

s∗j − 1− 1

m+

s∗im

×(si − s∗i ) ≥ 0, ∀s ∈ K 1.

Anna Nagurney Cybercrime and Cybersecurity

Page 90: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Algorithm for the Solution of the NE Model

We can apply the Euler method, presented earlier to solve thismodel

In view of the simple structure of the underlying feasible set, theEuler method yields at each iteration closed form expressions forthe security levels: i ; i = 1, . . . ,m given by:

sτ+1i =

max{0,min{usi , sτi + aτ (−

∂hi (sτi )

∂sτi

− (fi (Wi )− fi (Wi − Di )) 1

m

m∑j=1

sτj − 1− 1

m+

sτi

m

}}.

Anna Nagurney Cybercrime and Cybersecurity

Page 91: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Nash Bargaining Model of Cybersecurity Investments

The bargaining model proposed by Nash (1950b, 1953) is based onaxioms and focused on two players, that is, decision-makers. Theframework easily generalizes to m decision-makers, as noted inLeshem and Zehavi (2008). An excellent overview can be found inBinmore, Rubinsteiin, and Wolinsky (1989) and in the book byMuthoo (1999).

Let E (UNEj ) denote the expected utility of firm j evaluated at the

Nash equilibrium security level solution. E (UNEj ) is the

disagreement point of firm j , according to the bargainingframework.

Anna Nagurney Cybercrime and Cybersecurity

Page 92: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The Nash Bargaining Model of Cybersecurity Investments

The objective function underlying the Nash bargaining model ofcybersecurity investments is:

Z 1 =m∏

j=1

(E (Uj(s))− E (UNEj )).

The optimization problem to be solved is then:

Maximizem∏

j=1

(E (Uj(s))− E (UNEj ))

subject to:

E (Uj(s)) ≥ E (UNEj ), j = 1, . . . ,m,

s ∈ K 1.

We define the feasible set K 2 consisting of the above constraints,which we know is convex.

Anna Nagurney Cybercrime and Cybersecurity

Page 93: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

The System-Optimization Model of CybersecurityInvestments

Under system-optimization, the objective function becomes:

Z 2 =m∑

j=1

E (Uj(s))

and the feasible set remains as for the Nash equilibrium problem,that is, s ∈ K 1.

Hence, the system-optimization cybersecurity investment problemis to:

Maximizem∑

j=1

E (Uj(s))

subject to:s ∈ K 1.

Anna Nagurney Cybercrime and Cybersecurity

Page 94: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Numerical Case Study

Solutions of the Nash Equilibrium model were computed byapplying the Euler method, with the Euler method implemented inMatlab on a Lenovo G410 laptop with an Intel Core i5 processorand 8GB RAM.

The convergence tolerance was set to 10−5, so that the algorithmwas deemed to have converged when the absolute value of thedifference between each successively computed security level wasless than or equal to 10−5. The sequence {aτ} was set to:.1{1, 1

2 , 12 , 1

3 , 13 , 1

3 , ...}.

We initialized the Euler method by setting the security levels attheir lower bounds. The upper bounds on the security levelsusi = 0.99,∀i .

Anna Nagurney Cybercrime and Cybersecurity

Page 95: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Numerical Case Study

The solutions to the Nash Bargaining and System-Optimizationmodels were computed by applying the Interior Point Method inthe SAS NLP Solver. The algorithm was called upon while usingSAS Studio, a web browser-based programming environment. Themaximum optimality error, in each case example below, was5× 10−7 for the S-O solutions.

Anna Nagurney Cybercrime and Cybersecurity

Page 96: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Numerical Case Study

Wealth, damages, and investment costs are given in US dollars inmillions. The αi values in the cybersecurity investment functionsacross all examples are the number of employees in millions basedon the most recently available public data.

We consider two retailers. Firm 1 represents the second largestdiscount retailer in the United States, Target Corporation. Thefirm, in January 2014, announced that the security of 70 million ofits users was breached and their information compromised. Creditcard information of 40 million users was used by hackers togenerate an estimated $53.7 million in the black market as perNewsweek (2014).

Anna Nagurney Cybercrime and Cybersecurity

Page 97: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Numerical Case Study

Firm 2 represents Home Depot, a popular retailer in the homeimprovement and construction domain. Products available underthese categories are also sold through Target which makes themcompete for a common consumer base. The company wasstruggling with high turnover and old software which led to acompromise of 56 million users (Newsweek (2014)).

Firm 1 suffered $148 million in damages, according to theConsumer Bankers Association and the Credit Union NationalAssociation (Newsweek (2014)). Home Depot incurred a $62million in legal fees and staff overtime to deal with their cyberattack in 2014. Additionally, it paid $90 million to banks forre-issuing debit and credit cards to users who were compromised(Newsweek (2014)).

Anna Nagurney Cybercrime and Cybersecurity

Page 98: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

A Numerical Case Study

We use the annual revenue data for the firms to estimate theirwealth. Hence, in US$ in millions, W1 = 72600; W2 = 78800. Thepotential damages these firms stand to sustain in the case ofsimilar cyberattacks as above in the future amount to (in US$ inmillions): D1 = 148.0; D2 = 152.

As in Shetty et al. (2009), we assume that the wealth functionsare of the following form:

f1(W1) =√

W1; f2(W2) =√

W2.

The cybersecurity investment cost functions are:

h1(s1) = 0.25(1√

1− s1− 1); h2(s2) = 0.30(

1√1− s2

− 1).

The parameters α1 = .25 and α2 = .30 are the number ofemployees of the respective firms in millions, thereby, representingtheir size.

Anna Nagurney Cybercrime and Cybersecurity

Page 99: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Results

Results for the Nash Equilibrium model, the Bargaining Nashmodel, and the System-Optimization model for cybersecurityinvestments are summarized in the Table.

Solution NE NB S-Os∗1 0.384 0.443 0.460

s∗2 0.317 0.409 0.388

v1 0.616 0.557 0.540

v2 0.683 0.591 0.612

s∗ 0.350 0.426 0.424

v 0.650 0.574 0.576

E (U1) 269.265 269.271 269.268

E (U2) 280.530 280.531 280.534

Table 5: Results for NE, NB, and S-O for Target and Home Depot

Anna Nagurney Cybercrime and Cybersecurity

Page 100: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Results

The Nash equilibrium security level for Firm 1 is 0.384 and that forFirm 2 is .317, indicating that neither firm may be well-prepared toward off against cyber threats. The network security is .35 and thenetwork vulnerability is .65. Firm 2 achieves a higher expectedutility than Firm 1 under the Nash Equilibrium solution.

Target Corporation is part of the Retail Cyber Intelligence SharingCenter through which the firm shares cyber threat information withother retailers that are part of the Retail Industry LeadersAssociation and also with public stakeholders such as the U.S.Department of Homeland Security, and the F.B.I (RILA (2014)).Even Home Depot has expressed openness towards the sharingthreat information.

Anna Nagurney Cybercrime and Cybersecurity

Page 101: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Sensitivity Analysis

We report the results for sensitivity analysis by increasing thevalues of the Di parameters for i = 1, 2. The wealth and alphaparameters are fixed as follows: (in US$ in millions) W1 = 72600,W2 = 78800; (in millions) α1 = 0.25, α2 = 0.30. The solutions arereported in the following Tables.

Parameters NE NB S-OD1 D2 E(U1) E(U2) E(U1) E(U2) E(U1) E(U2)

24800 25200 268.476 279.648 268.485 279.658 268.484 279.65934800 35200 268.377 279.542 268.386 279.551 268.385 279.55244800 45200 268.290 279.451 268.300 279.461 268.300 279.461

Table 6: Expected Utilities for NE, NB, and S-O for Target and HomeDepot for Varying Di Parameters for α1 = .25 and α2 = .30

Anna Nagurney Cybercrime and Cybersecurity

Page 102: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Sensitivity Analysis

Parameters NE NB S-OD1 D2 s∗1 s∗2 v s∗1 s∗2 v s∗1 s∗2 v

24800 25200 .924 .915 .08040 .933 .924 .07165 .933 .924 .0716634800 35200 .935 .927 .06890 .943 .935 .06144 .943 .934 .0614544800 45200 .943 .935 .06090 .949 .942 .05431 .949 .942 .05432

Table 7: Network Vulnerability v for NE, NB, and S-O for Target andHome Depot for Varying Di Parameters for α1 = .25 and α2 = .30

Anna Nagurney Cybercrime and Cybersecurity

Page 103: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Sensitivity Analysis

The network vulnerability is consistently the lowest for the NBsolution concept, demonstrating the benefit of bargaining forcooperation in cybersecurity. The increase in expected utilities onemploying NB over NE is US$ 10,193 for Target and US$ 10,346for Home Depot in the scenario wherein D1 = 44800, D2 = 45200.Comparison of S-O and NB shows an increase of US$ 515 forHome Depot but a decrease of US$ 513 for Target whenD1 = 44800, D2 = 45200.

Anna Nagurney Cybercrime and Cybersecurity

Page 104: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Additional Sensitivity Analysis

We now report the results for additional sensitivity analysis byincreasing the values of the Di parameters for i = 1, 2 where thewealth and alpha parameters are fixed as follows: (in US$ inmillions): W1 = 72600, W2 = 78800; (in millions),α1 = 100.00,α2 = 120.00. The results are reported in the subsequent Tables.The higher alpha parameters result in a significant increase inexpected utilities as we move from NE to NB and S-O.

Parameters NE NB S-OD1 D2 E(U1) E(U2) E(U1) E(U2) E(U1) E(U2)

24800 25200 222.472 235.991 223.541 237.087 223.410 237.22034800 35200 210.460 223.098 211.619 224.278 211.517 224.38144800 45200 200.039 212.090 201.276 213.340 201.212 213.405

Table 8: Expected Utilities for NE, NB, and S-O for Target and HomeDepot for Varying Di Parameters for α1 = 100.00 and α2 = 120.00

Anna Nagurney Cybercrime and Cybersecurity

Page 105: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Additional Sensitivity Analysis

Parameters NE NB S-OD1 D2 s∗1 s∗2 v s∗1 s∗2 v s∗1 s∗2 v

24800 25200 .169 .066 .88285 .262 .164 .78711 .265 .161 .7871934800 35200 .289 .197 .75705 .369 .281 .67496 .371 .279 .6750244800 45200 .374 .288 .66915 .444 .363 .59661 .445 .362 .59665

Table 9: Network Vulnerability v for NE, NB, and S-O for Target andHome Depot for Varying Di Parameters α1 = 100.00 and α2 = 120.00

Anna Nagurney Cybercrime and Cybersecurity

Page 106: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Additional Sensitivity Analysis

Figure 4: Representation of Table Showing Comparison of NetworkVulnerability v for NE, NB, and S-O with Varying Di Parametersα1 = 100.00 and α2 = 120.00

The network vulnerability is consistently the lowest for the NBsolution, signifying the benefits of cooperation for cybersecurity.

Anna Nagurney Cybercrime and Cybersecurity

Page 107: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybersecurity and Supply Chains

Figure 5: Supply chains are also vulnerable to cyber attacks and canserve as entre points

Anna Nagurney Cybercrime and Cybersecurity

Page 108: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Cybersecurity, Supply Chains, and Game Theory

m

m

1

1

m

m

. . .

. . .

Retailers

i

j

Demand Markets

· · ·

· · ·

m

m

m

n

��

��

��

���

BBBBBBBBBN

HHHHHHHH

HHHHH

HH

HHHj

��

��

��

��

��

��

��

���

ZZ

ZZ

ZZ

ZZ

ZZ

ZZ~

BBBBBBBBBN

��

��

��

��

��

��=

�������

�������

�����

Figure 6: The Structure of the Supply Chain Network Game TheoryModel

Anna Nagurney Cybercrime and Cybersecurity

Page 109: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Some More of Our Recent Work

A Supply Chain Game Theory Framework for Cybersecurity InvestmentsUnder Network Vulnerability, A. Nagurney, L.S. Nagurney, and S. Shukla(2015), in: Computation, Cryptography, and Network Security, N.J.Darasand M.Th. Rassias, (Eds.), Springer, pp 381-398.

A Game Theory Model of Cybersecurity Investments with Information

Asymmetry, A. Nagurney and L.S. Nagurney (2015), Netnomics 16(1-2),

pp 127-148.

Cybersecurity Investments with Nonlinear Budget Constraints:Analysis of the Marginal Expected Utilities, P. Daniele, A.Maugeri, and A. Nagurney (2016), invited paper for OperationsResearch, Engineering, and Cyber Security, Th.M. Rassias and N.J.Daras, (Eds.), Springer International Publishing Switzerland.

Anna Nagurney Cybercrime and Cybersecurity

Page 110: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Our Latest Supply Chain Book

Anna Nagurney Cybercrime and Cybersecurity

Page 111: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

In the book, we present supply chain network models and tools toinvestigate, amongst other topics, information asymmetry, impactsof outsourcing on quality, minimum quality standards, applicationsto industries such as pharma and high tech, freight services andquality, and the identification of which suppliers matter the mostto both individual firms’ supply chains and to that of the supplychain network economy.

Anna Nagurney Cybercrime and Cybersecurity

Page 112: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Summary and Conclusions

• In the final part of this presentation, we overviewed our work onnetwork vulnerability from a cybersecurity perspective. Our“clients” were retailers, who have also encountered a growingnumber of cyberattacks. Additional results we have obtained forcase studies in financial services and in the energy sector

• The cybersecurity investment models that we prevented includedNash Equilibrium, Nash Bargaining, as well asSystem-Optimization models. The results demonstrate therelevance of cooperation with the most practical cooperative modelbeing that of Nash Bargaining.

• Our research integrates inputs from practitioners with the goal ofproviding prescriptive analytics for decision-making forcybersecurity investments.

Anna Nagurney Cybercrime and Cybersecurity

Page 113: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Summary and Conclusions

• In the final part of this presentation, we overviewed our work onnetwork vulnerability from a cybersecurity perspective. Our“clients” were retailers, who have also encountered a growingnumber of cyberattacks. Additional results we have obtained forcase studies in financial services and in the energy sector

• The cybersecurity investment models that we prevented includedNash Equilibrium, Nash Bargaining, as well asSystem-Optimization models. The results demonstrate therelevance of cooperation with the most practical cooperative modelbeing that of Nash Bargaining.

• Our research integrates inputs from practitioners with the goal ofproviding prescriptive analytics for decision-making forcybersecurity investments.

Anna Nagurney Cybercrime and Cybersecurity

Page 114: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

Summary and Conclusions

• In the final part of this presentation, we overviewed our work onnetwork vulnerability from a cybersecurity perspective. Our“clients” were retailers, who have also encountered a growingnumber of cyberattacks. Additional results we have obtained forcase studies in financial services and in the energy sector

• The cybersecurity investment models that we prevented includedNash Equilibrium, Nash Bargaining, as well asSystem-Optimization models. The results demonstrate therelevance of cooperation with the most practical cooperative modelbeing that of Nash Bargaining.

• Our research integrates inputs from practitioners with the goal ofproviding prescriptive analytics for decision-making forcybersecurity investments.

Anna Nagurney Cybercrime and Cybersecurity

Page 115: From Cybercrime in Financial Services to Cybersecurity ......From Cybercrime in Financial Services to Cybersecurity Investments and Network Vulnerability Anna Nagurney John F. Smith

THANK YOU!

For more information, see: http://supernet.isenberg.umass.eduAnna Nagurney Cybercrime and Cybersecurity