A semigraphical method for saddle point calculation in information security playing problems
An optimization of resources allocation between information security objects is complicated due to the fact that the opposition occurs in uncertainty conditions when the opponent actions are unknown. First approach to solve this problem is the dynamic re-sources management in which protection reacts to the opponent’s actions effectively by changing the strategy after every opponent’s step. In some cases, the uncertainty causes difficulties in implementing the protection that makes the process of dynamic management impossible. Another approach is based on providing a guaranteed outcome when the allocation of protection resources is not optimal for all strategies of the opponent, but guarantees that, for any of its actions, the information loss will not exceed the defined value. The implementation of this approach is the matrix game saddle point, which reflects the dormancy state of the dynamic confrontation between two sides. The saddle point existence conditions are analyzed in a system of two objects depending on its vulnerability, resources allocation between them, and the conflicting sides resources ratio.
Demchyshyn M.V. Heometrychna interpretatsiya optymizatsiyi rozpodilu resursiv mizh ob"yektamy zakhystu informatsiyi, Zakhyst informatsiyi. — 2011. — # 2(51). — S. 21–28.
Levchenko Ye.H., Rabchun A.O. Optymizatsiyni zadachi menedzhmentu informatsiynoyi bezpeky // Suchasnyy zakhyst informatsiyi. — 2010. — # 1. — S. 16–23.
SHikin E.V., SHikina G.E. Issledovaniye operatsiy. — M.: Prospekt. — 2006. — 280 s.
Levchenko Ye.H., Demchyshyn M.V., Rabchun A.O. Matematychni modeli ekonomichnoho menedzhmentu informatsiynoyi bezpeky // Systemni doslidzhennya ta informatsiyni tekhnolohiyi. — 2011. — # 4. — S. 88–96.
Gordon L.A., Loeb M.P. The Economics of Information Security Investment // ACM Transactions on Information and System Security. — 2002. — 5, № 4. — p. 438–457.
Liu W., Tanaka H., Matsuura K. Empirical-Analysis Methodology for Information-Security Investment and Its Application to a Reliable Survey of Japanese Firms // Information Processing of Japan Digital Courier, Sep. 2007. — 3. — p. 585–599.