How to Quantify Deterrence and Reduce Critical Infrastructure Risk
Loading...
Files
Authors
Taquechel, Eric F.
Lewis, Ted G.
Subjects
Advisors
Date of Issue
2012-08
Date
2012-08
Publisher
Monterey, CA; Naval Postgraduate School Center for Homeland Defense and Security
Language
Abstract
"We propose a definition of critical infrastructure deterrence and develop a methodology to explicitly quantify the deterrent effects of critical infrastructure security strategies. We leverage historical work on analyzing deterrence, game theory and utility theory. Our methodology quantifies deterrence as the extent to which an attacker's expected utility from an infrastructure attack changes after a defender has invested to deter attacks, as compared to their expected utility absent deterrence. We derive expected utilities from a modified game theory approach, which uses probabilistic utility functions, wherein utility function probabilities are functions of investment. We vary these functions based on different information availability assumptions (e.g., perfect vs imperfect attacker information). We produce evidence that it is quantifiably more advantageous to overtly deter, rather than conceal security information, under specific conditions. We also leverage these utility functions to determine the unconditional risk to a defender if deterrence strategies fail, and we determine cost efficiency of those strategies."
Type
Article
Description
This article appeared in Homeland Security Affairs (August 2012), v.8, article 12
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Homeland Security Affairs (August 2012), v.8, article 12
Distribution Statement
Rights
The copyright of all articles published in Homeland Security Affairs rests with the author[s] of the articles. Any commercial use of Homeland Security Affairs or the articles published herein is expressly prohibited without the written consent of the copyright holder. Anyone can copy, distribute, or reuse these articles as long as the author and original source are properly cited.