Tuesday, June 11, 2019
LitReview Essay Example | Topics and Well Written Essays - 1750 words
LitReview - Essay ExampleConsideration of a threat doles out(a) as a restriction or limitation that creates hindrances to perform required tasks as it dissuades to take action considering losses and costs. The whole process can be seen as a military action in which, concerned parties ar restricted to take any military action that would affect the foreign indemnity objectives of the two involved states. Any sort of initiation of combating action is deterred. Rational choice system is an other(a) theory that is influential in term of cyber certification. This theory allows contemplation and differentiation of varied accessible tactics. Cornish & Clarke (1986) inform that this theory emerged considering a notion related to cost benefit analysis. For example, a criminal conducts a crime when it appears advantageous to him. The theory also puts light on challengers haziness towards defenders selected option. Nevertheless, the theory fails to resolve the strategized relationship min gled with concerned parties, which are thoroughly reviewed in lame theory (Understanding Society, 2008). The challengers select their intended defenders diligently and also work on their combating strategies considering previously employed strategies by the defenders. According to Cavusoglu, Raghunathan & Yue (2008), Decision theory is weak in handling the challengers worked out strategies and revisiting of defenders actions because as per the theory, defender regards challengers devised performances as exogenic. According to the game theory, defenders choices and challengers actions are endogenous. According to the decision theory, the scenarios according to which, the involved parties have to take action are predefined due to which, the actions performed by actors are regarded exogenous. Von Newmann and Morgenstern (1944) inform that each contestant is eligible to evaluate variables of his actions only. There are rational rules involved in considering of variables and comprehensi on of variables of others actions, which cannot be determined statistically. Therefore, it has been required to explore a more viable theory that can be applied to cyber security. Researchers have moved towards game theory to comprehend the relationship between actors in cyber security issues. In addition, Nisan and Ronen (1999), Nisan (2007) inform about mechanism design that has assisted towards development of protection and concealing mechanisms. These mechanisms are designed with the support of systematic results. Because of usage of game theory, there are certain security decisions. These security decisions are supportive in terms of distribution of restricted resources, stability of professed problems and consideration of core inducement mechanisms. In game theoretical model, more than one person are involved in the decision making process and examining the decisions made where players are either directly or indirectly involved to share the resources provided in the game. Gam es relevant to the strategic security can be simple or compound. The game can be helpful in solving the simple as well as complex formulated security issues. The security issues can be related to the wireless or computer controlled communication programs. The strategy can provide a event of the user privacy issues, etc. Utilizing this theoretical model, a defender keeps maintaining the security of the network and the system, while an attacker always tries to access the secure
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.