12,608 research outputs found

    Moral Hazard with Counterfeit Signals

    Get PDF
    In many moral hazard problems, the principal evaluates the agent's performance based on signals which the agent may suppress and replace with counterfeits. This form of fraud may affect the design of optimal contracts drastically, leading to complete market failure in extreme cases. I show that in optimal contracts, the principal deters all fraud, and does so by two complementary mechanisms. First, the principal punishes signals that are suspicious, i.e. appear counterfeit. Second, the principal is lenient on bad signals that the agent could suppress, but does not

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    The role of social interaction in farmers' climate adaptation choice

    Get PDF
    Adaptation to climate change might not always occur, with potentially\ud catastrophic results. Success depends on coordinated actions at both\ud governmental and individual levels (public and private adaptation). Even for a “wet” country like the Netherlands, climate change projections show that the frequency and severity of droughts are likely to increase. Freshwater is an important factor for agricultural production. A deficit causes damage to crop production and consequently to a loss of income. Adaptation is the key to decrease farmers’ vulnerability at the micro level and the sector’s vulnerability at the macro level. Individual adaptation decision-making is determined by the behavior of economic agents and social interaction among them. This can be best studied with agentbased modelling. Given the uncertainty about future weather conditions and the costs and effectiveness of adaptation strategies, a farmer in the model uses a cognitive process (or heuristic) to make adaptation decisions. In this process, he can rely on his experiences and on information from interactions within his social network. Interaction leads to the spread of information and knowledge that causes learning. Learning changes the conditions for individual adaptation decisionmaking. All these interactions cause emergent phenomena: the diffusion of adaptation strategies and a change of drought vulnerability of the agricultural sector. In this paper, we present a conceptual model and the first implementation of an agent-based model. The aim is to study the role of interaction in a farmer’s social network on adaptation decisions and on the diffusion of adaptation strategies\ud and vulnerability of the agricultural sector. Micro-level survey data will be used to parameterize agents’ behavioral and interaction rules at a later stage. This knowledge is necessary for the successful design of public adaptation strategies, since governmental adaptation actions need to be fine-tuned to private adaptation behavior

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Tracking advanced persistent threats in critical infrastructures through opinion dynamics

    Get PDF
    Advanced persistent threats pose a serious issue for modern industrial environments, due to their targeted and complex attack vectors that are difficult to detect. This is especially severe in critical infrastructures that are accelerating the integration of IT technologies. It is then essential to further develop effective monitoring and response systems that ensure the continuity of business to face the arising set of cyber-security threats. In this paper, we study the practical applicability of a novel technique based on opinion dynamics, that permits to trace the attack throughout all its stages along the network by correlating different anomalies measured over time, thereby taking the persistence of threats and the criticality of resources into consideration. The resulting information is of essential importance to monitor the overall health of the control system and cor- respondingly deploy accurate response procedures. Advanced Persistent Threat Detection Traceability Opinion Dynamics.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions
    corecore