156
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Information security outsourcing in a resource-sharing environment: The impacts of attack modes

, , &
Pages 1092-1110 | Received 22 Aug 2022, Accepted 29 Jun 2023, Published online: 14 Jul 2023
 

Abstract

Information security outsourcing has become an emerging trend in the operations of information security, but the relation between information assets of firms and attack modes of hackers have failed to be considered. Through building a game-theoretic model, this article analyzes security outsourcing of two firms who share their information resource with each other and are confronted with opportunistic attacks and targeted attacks. We find that in the case of security decisions in-house, the firms may obtain a lower expected cost and the hacker may derive a lower expected benefit under targeted attacks than under opportunistic attacks, even though targeted attacks are widely deemed to be more harmful to the firms. When outsourcing security operations to a MSSP (Managed Security Service Provider), we reveal that under targeted attacks the MSSP can reap a higher expected benefit and the hacker can still derive a lower expected benefit. Finally, we examine the effects of key security elements and find some interesting results. In particular, the MSSP may or may not benefit from the degree of resource sharing, and the hacker may suffer from its learning ability.

Data availability statement

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Disclosure statement

No potential conflict of interest was reported by the authors.

Notes

1 The breach probability under opportunistic attacks can be calculated as pI=1/(lnvkFL).

2 The second order conditions on security investments and attack efforts naturally hold in Class I and Class II because 2CiF/zi2>0 and 2πH/hi2<0 at equilibrium.

3 The optimality of equilibrium solution ti,tj,di,dj can be guaranteed. Given CiFCIF and CjFCIF, since πM(ti,tj,di,dj) increases with ti and tj, we have

πM(ti,tj,di,dj)πM(pi(diL)pjαL+CIF,pj(djL)piαL+CIF,di,dj)=πLM(di,dj).

The Hessian matrix of πLM(di,dj) at the equilibrium solution di and dj is

(2πLM(di,dj)/di22πLM(di,dj)/didj2πLM(di,dj)/djdi2πLM(di,dj)/dj2)

in which

2πMdi2=2L(1+α)kMdi3lnv(1+β)(1ϕ)kMdi2lnv(1+β)=(1ϕ)3kM(L(1+α))2lnv(1+β)<0

2πMdidj=2πMdjdi=0

2πMdj2=2L(1+α)kMdj3lnv(1+β)(1ϕ)kMdj2lnv(1+β)=(1ϕ)3kM(L(1+α))2lnv(1+β)<0.

It follows from det(2πLM(di,dj)/di22πLM(di,dj)/didj2πLM(di,dj)/djdi2πLM(di,dj)/dj2)>0 that such Hessian matrix is negative definite.

4 The optimality of equilibrium solution ti,tj,di,dj can be guaranteed as well, similar with Class I. The Hessian matrix with di and dj takes the form of

(2πM(di,dj)/di22πM(di,dj)/didj2πM(di,dj)/djdi2πM(di,dj)/dj2)

where 2πMdi2=v12ϕ(1ϕ)52ϕ2ϕ(ϕa(1+μβ))ϕ2ϕ(2ϕ)(kM(1+β))12ϕ(L(1+α))32ϕ2ϕ<0

2πMdidj=2πMdjdi=0

2πMdi2=v12ϕ(1ϕ)52ϕ2ϕ(ϕa(1+μβ))ϕ2ϕ(2ϕ)(kM(1+β))12ϕ(L(1+α))32ϕ2ϕ<0.

One can know from det(2πM(di,dj)/di22πM(di,dj)/didj2πM(di,dj)/djdi2πM(di,dj)/dj2)>0 that this Hessian matrix is negative definite.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 277.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.