=Paper= {{Paper |id=Vol-2040/paper14 |storemode=property |title= Optimal Investment in Cyber Attack and Resilience: A Dynamic Differential Game |pdfUrl=https://ceur-ws.org/Vol-2040/paper14.pdf |volume=Vol-2040 |authors=Alexander Alexeev,Kerry Krutilla,Eric Jardine }} == Optimal Investment in Cyber Attack and Resilience: A Dynamic Differential Game== https://ceur-ws.org/Vol-2040/paper14.pdf
Optimal Investment in Cyber Attack and Resilience:
          A Dynamic Differential Game



                       Alexander Alexeev
           School of Public and Environmental Affairs
                      Bloomington, Indiana

                            Eric Jardine
               Assistant Professor Political Science
 Virginia Polytechnic Institute and State University, in Blacksburg,
                              Virginia

                         Kerry Krutilla
                       Associate Professor
           School of Public and Environmental Affairs
                      Bloomington, Indiana
                                          Abstract

In this article, we develop a differential game to assess optimal investment in cyber measures.
The model is based on an augmented contest success function in which efforts to influence an
endogenous probability of attack reflect a combination of resource commitments this period and
the state of knowledge. The state of knowledge decays with exogenous technical advance, but
increases as a function of resource commitments this period. The model is solved, and steady-
state solutions for optimal cyber investment as a function of changes in the models parameters
assessed.
1. Introduction
It is sometimes argued that a full-blown cyberwar between state actors will not take place (Rid
2013). However, the short history of digital engagements shows that lower-intensity
governmental conflicts are becoming a regular occurrence (Healey 2012; Clarke and Knake
2010; Kaplan 2016; Valeriano and Maness 2015; Stiennon 2015). Well known examples include
the Russian distributed denial of service (DDoS) attacks on Estonia in 2007 and Georgia in 2009,
the deployment of the US-Israeli Stuxnet virus that destroyed Iranian nuclear centrifuges at
Natanz in 2010 (Zetter 2014), and the successful attacks on the Ukrainian power grid in 2015,
2016, and now 2017.

Moreover, while firms, particularly in the financial sector, are often the target of data breaches,
government is the fourth most popular target, with over 20% of the data breaches recorded
between 2005 and 2017, as well as the third highest number of compromised records, at 14%.
Over this period, governments were breached some 743 times and had some 183,668,599 records
compromised, according to data from Privacy Rights Clearinghouse. As was the case with the
hack of the US Office of Personnel Management (OPM), many of these breached files include
highly sensitive information such as social insurance numbers.

Concerns about the effects of cyberattacks have stimulated governments to invest in their cyber
arsenals. These investments have taken many forms, ranging from the highly technical to
regulatory development, human capital generation, and diplomatic initiatives. As the recent
Shadow Broker leaks make clear, the US government (alongside many other governments) is
deeply involved in the purchase and retention of so-called zero-day vulnerabilities for which
there is no technological defense (Cox 2016). The Federal Bureau of Investigation’s (FBI)
purchase of a zero-day exploit to gain access to the iPhone of one of the San Bernardino
terrorists is a classic example, although other US government agencies such as the DEA and,
especially the NSA, are also deeply involved in buying up these highly valued software defect
(Cox 2017; Hampson and Jardine 2016).

The US government is also working to develop domestic regulatory frameworks to help protect
critical national infrastructure (NIST 2017), while simultaneously investing heavily in
infrastructure modernization through initiatives such as Information Technology Modernization
Fund (The White House 2016). The Department of Homeland Security hosts annual
Cybersecurity Awareness Months, with the aim of developing higher levels of human capital
among the general population. Additionally, some governmental cybersecurity actions play out
on the international stage, where diplomatic efforts in the United Nations Group of
Governmental Experts (UNGGE) have led to a list of normative principles that would put a leash
on governmental use of cyberweapons (United Nations 2015).

Notwithstanding growing attention to cybersecurity concerns and increasing public resource
commitments to offensive and defensive measures, resources are limited and government
confront the economic challenge of balancing the gains from cyber investments against their
opportunity costs. This trade-off has a probabilistic dimension; resource commitments in cyber
measures do not yield certain results, and outcomes are also affected by the reaction of rivals to a
country’s behavior. A probabilistic game theoretic formulation is the method to model these
interactions. This article extends the one-period game theoretic model in Alexeev and Krutilla
(2015) to the more realistic setting of a repeated rivalry between governments. In the expanded
model explored here, resource commitments to cyber actions this period increase the stock of
knowledge, and the probability of a successful attack is a function both of the stock of
accumulated knowledge from past actions and behavior in the present.

We start in the next section with a review of the literature on optimal investment in
cybersecurity. The following section then describes the model developed in this research. The
next section presents the solution for steady state resources devoted to cyber defense and attack
as a function of the model’s parameters. The final section of the article offers conclusions and
recommendations for future research.


2. Background

The literature on optimal investment in cyber measures is relatively limited. The benchmark
model is by Gorden and Loeb (2002). It is based on a one period model in which firms are risk
neutral, and within this context, examines optimal investments a firm should make to defend
against cyber attacks. The model assumes that the probability of a cyber attack is exogenous, but
firms can unilaterally reduce their vulnerability through investment in security measures. Given
this set-up, the model demonstrates that firms should not invest more than 1/e ( ≈ 37%) of the
expected cost of a data breach (Gordon and Loeb 2002). This result turns out to be robust across
a more general range of functional forms (Baryshnikov 2012).

However, the 37% result does not hold up in a one-period game formulation of Alexeev and
Krutilla (2015). In this model, the probability of a successful attack endogenously depends on the
resources rivalrous governments devote to attack and defense. The model allows for asymmetric
valuations of gains and losses by the rivals, and relative differences in the efficacy of their
resource committments. In this setting, optimal investments can be significantly greater or less
than 37% of expected damages.

Extending the Gorden and Loeb (2002) model to risk averse firms, a model by Huang, Hu and
Behara 2008 shows that there is a minimal data breach cost below which the optimal level of
investment in cybersecurity protections drops to zero. As the potential cost of a breach goes up
optimal investment in cybersecurity increases, but the value never exceeds the total cost of the
incident.

A rare empirical study shows that the cost of most data breaches tend to be roughly
commensurate with a firm’s IT security budget. For example, making an assumption about the
fraction of budget devoted to IT security, 77% of data breach costs are within +/- 10 million
dollars of the firm’s IT security budget, while fully 50% of incidents fall within +/- 1 million
dollars (Romanosky 2016, 13).

This small literature suggests several research gaps in study of optimal cyber investment. Most
significantly, single-period models convey limited information. The value from investments in
cyber measures in the current period does not necessarily fall exclusively in the period and some
cyber security measures, such as staff training in cybersecurity digital hygiene, might not pay out
much immediately but could continue to pay dividends well into the future. With past
investments paying future dividends, it is possible that the safety of a cyber system could
increase even as the annual rate of investment decreases.

There is also the possibility of additional learning over time. Some sort of information accretion
process, such as Bayes Rule, could be used to form a better judgement about risk levels with
experience (Cavusoglu, Mishra and Raghunathan 2004). Organizations can also come to learn
more about their adversaries over time with repeated conflictual interactions. The so-called
“attribution problem” is an example. (Tsagourias 2012; Rid and Buchanan 2015). Through a
series of technical steps, careful attackers can obfuscate their identity, motive and location,
making deterrence of attacks via the threat of credible punishment more difficult. Effective
attribution leverages both the particular details of a specific attack, but also historical details
from past attacks. Attack methods, idiosyncrasies in the code and target types across multiple
attacks can be combined with forensic details on the current assault to produce a more complete
picture of who launched a particular attack.

A prime example is the hack of the Democratic National Committee (DNC) by Russian
operatives in the lead up to the 2016 presidential election. DHS and the FBI released a joint
analysis report in December of 2016 presenting the technical details involved in the hack of the
DNC (NCCIC/FBI 2016). One of the telling features of the report is the focus on how advanced
persistent threats 28 and 29, as they were technically known, had entered the system on multiple
occasions. As the report put it, “Both groups have historically targeted government
organizations, think tanks, universities, and corporations around the world.” (Ibid., 2). This
pattern of historical interaction breeds a familiarity with an adversary’s toolkit and social
engineering approaches. This familiarity, in turn, makes defense easier, potentially necessitating
less investment, but it cannot be captured in a single period model.

The model developed in this article focuses on the first of the issues mentioned: the fact that
effects of investments in cyber measures this period can have dynamic multi-period effects. To
our knowledge, this is the first application of a differential game model exploring optimal
investment with cyber knowledge accumulating over time.

2. Model

The model extends the contest success function approach of Alexeev and Krutilla (2015) to the
multi-period setting. There are two competing governments, an “attacker” and a “defender”, with
the objectives:

                      ∞
               max ∫ (U A ( RA , K A , RD , K D ) ) e −ηt dt                       (1)
                 RA
                      0
                      ∞
               max ∫ (U D ( RA , K A , RD , K D ) ) e −ηt dt               (2)
                 RD
                      0
and constraints:
                 = −δK + ν R
                K                                                                                (3)
                  A    A   A  A


                K D = −δK D + ν D RD                                                            (4)

The variables and parameters of this model are defined in Table 1. The expression for the
attacker and defender’s utilities in (1) and (2) are represented as expected net payoffs, as follows:

               U A = G A P() − RA                                                               (5)

               U D = GD P() + RD                                                                (6)

where G A and GD are the utility gains to attacker and losses to defender respectively from a
successful attack, P() is the probability of a successful attack, and RA and RD are the flow
resources committed this period to attack and defense respectively.

Note that K A and K B represent the state of knowledge of the attacker/defender this period, and
that equations (3) and (4) show the rate of change of the state of knowledge, K A and K , as a
                                                                                             D
function of two influences. The first, the parameter δ ∈ [0,1] , shows the decay rate of the state of
knowledge. This parameter is assumed to be driven by global, exogenous technical advance in
cyber security and offensive capabilities. This technical advance reduces the effectiveness of the
existing state of knowledge at rate δ over time, all else constant. On the other hand, this
period’s effort in attack ( RA ) and defense ( RD ) have enduring effects on the state of knowledge.
The fractional parameters, ν A ∈ [0,1] and ν D ∈ [0,1] , show what part of this period’s efforts have
effects on the state of knowledge lasting beyond the period. To summarize K A and K are a  D
function of the rate of depreciation and new investment, with the latter being some part of this
period’s efforts in attack and defense.

Following Alexeev and Krutilla (2015), the probability, P() , of a successful attack is
represented as:

                                      EA + ω     
                               P=                                                    (7)
                                  E A + σED + 2ω 

where ( E A ) is “Effective Effort in Attack” and ( ED ) is “Effective Effort in Defense”, σ is the
relative technical efficiency of “Effective Effort in Attack” compared to “Effective Effort in
Defense,” ω is a noise parameter allowing for a degree of bounded rationality. To fix ideas, let
σ = 1 and ω = 0 , and notice that, under these conditions, if E A = ED , P = .5 . Again under the
same assumptions, if E A = 2 ED , then P = .66 ,whereas, if .5 E A = ED , P = .33. In short, when
“Effective Effort in Attack” is greater than “Effective Effort in Defense”, the probability of an
effective attack is greater than 50%, and vice versa -- under the default parameter settings.
The σ parameter represents differences in the efficiency of effective effort. If σ > 1 , the
defender’s effort reduces the probability of a successful attack more than the attacker’s effort
increases it, and vice versa. In fact, there is some literature suggesting attackers have an inherent
advantage, implying that σ < 1 might be relatively typical.
Finally, notice that as ω goes from zero to infinity, P will go to 50% whatever the rivals do.
This parameter reflects noise in the sense that rivals do not respond with perfect sensitivity to
each other’s actions when ω assumes a non-zero value.
We now depart from Alexeev and Krutilla (2015) in defining “Effective Effort” as composites of
two variables:

E A = RαA A K 1A−α A ,   ED = RDα D K D1−α D                                                      (8)

The parameters α A and α D are the share parameters for “Effective Effort” arising from resource
commitments this period on the part of the attacker and defender respectively, while 1 − α A and
1 − α D are the share parameters for “Effective Effort” arising from the attacker’s and defender’s

cumulated stock of knowledge. Entering (8) into (7) gives the complete expression for the
probability of an effective attack:

           Rα A K 1−α A + ω 
P =  α A 1−α AA A α D 1−α D                                                               (9)
     RA K A + σRD K D + 2ω 


Using all of the information discussed, the current value Hamiltonians for the differential game
are:



               Rα A K 1−α A + ω 
H A = ψ  α A 1−α AA A α D 1−α D  − RA + λ1 (− δK A +ν A RA ) + λ2 (− δK D +ν D RD )             (10)
         RA K A + σRD K D + 2ω 




               RαA A K 1A−α A + ω                                                               (11)
H D = −  α A 1−α A        α D 1−α D  − RD + λ3 (− δK D +ν D RD ) + λ4 (− δK A +ν A RA )
         RA K A + σRD K D + 2ω 
                                                    GA
In (11), note that GD is normalized to 1, and ψ ≡      in (10). GD = 1 might be thought of as the
                                                    GD
economic loss to the defender from a successful attack, while ψ is the relative value of a
successful attack for the attacker compared to the economic costs that the attack imposes.
4. Results
We focus on the way the steady-state solutions respond to the parametric variations. The
dynamic transition paths are of less interest, reflecting arbitrary variations in initial conditions.
The model does not have analytical solution, so numerical simulation is used.

The parametric variations considered in this preliminary analysis are shown in Table 2. The
corresponding results for steady-state resource commitments in attack and defense are shown in
Table 3.

The first simulation varies the relative effectiveness of resource commitments in attack and
defense, with permutation SA1 showing the case that the defender’s resource commitments are
relatively more effective, and SA2 showing greater efficiency of the attacker’s efforts.
Interestingly, these asymmetries result in a symmetric decline for both the attacker and defender
in resource commitments from the base case, suggesting that disparities in relatively efficiency in
resource use can reduce resource equilibrium commitments. 1 The logic of this reality can be seen
in the limiting case where one party or the other’s resource commitments are totally effective,
and the other party’s are completely ineffective. For example, if the defenders efforts were 100%
effective, there would be no point for the attacker to waste resources in attacking. From the cyber
security perspective, the policy implication would be increasing the effectiveness of defensive
efforts would both reduce the probability of successful attacks and reduce the resources needed
to deter them.

Comparing the resource commitments as a ratio of expected damages -- the common metric
used in the literature – gives a higher fraction of expenditure when deterrence is relatively
effective (.58 for SA1) than when it isn’t (.29 for SA2). Although the ratio of cost to expected
damages is an intuitively logical metric, some policy relevant insight (as discussed above) is lost
if the absolute comparison is not also made.

Turning to variation in the share parameters for “Effective Effort” arising from resource
commitments this period, SA3 shows the case where this period’s effort has a relatively low
impact on Effective Effort (.2), while SA4 shows the case where the impact is relatively high
(.8). Steady-State resource commitments decline in the first instance relative to the base case,
and increase in the second case. However, the probability of attack does not change.

The next simulation pair (SA5) and (SA6) compares the impact of different valuations on the
part of the attacker per unit of economic damages a successful attack causes to the defender. In
SA5, the attacker’s valuation is twice the economic damages caused; in SA6 it is half. For SA5,
the asymmetry increases the resources the attacker devotes to attack from .22 to .39, and
decreases the defenders recourse commitment from .22 to .19. For SA6, the resources the
attacker devotes drop from .22 to .10; the defenders resource commitments drop to .19 as before.
It is interesting that the relative valuation asymmetry in either direction reduces the resources a
defender rationally commits to defense.


1
  A similar result was observed in Krutilla and Alexeev (2012) in another game theory model using a contest success
function.
The final comparison assesses the effect of changing the fraction of resource commitments this
period that affects the state of state of knowledge beyond one period. In SA7, the parameter is
reduced from the base case of .5 to .25; in SA8, the parameter is raised to .75. The surprise from
this comparison is that it has no effect on the base case level of resource commitments, or change
in probability of attack. It does significantly affect the steady state accumulation of knowledge
(not shown in Table 3). We are now exploring the reasons for this result.

These results are 1quite preliminary and we will be continuing to assess the effects of changing
the other parameters, as well other asymmetries between attackers and defenders. An additional
next step is to assess whether the literature suggests parameter settings that are consist with
empirical studies.

5. Conclusions
This research develops a differential game formulation to study temporal optimal investments in
cyber measures. The literature on optimal cyber investment is relatively small, and our model
represents a significant extension. Among other attributes, it distinguishes between the effects of
resource commitments in influencing attacks in current versus future periods, allows for
asymmetries in the effectiveness of cyber measures between attackers and defenders, and shows
the impact of asymmetric valuations by attackers and defenders of the damages cyber attacks
cause. The model allows for sensitivity analysis of a number of policy-relevant parameters.
The study is quite preliminary with much simulation work in progress. Additionally, we are
reviewing the literature to calibrate parameters to reflect empirically reasonable cases.
Table 1: Variable and Parameter Definitions
 Variables                    Definitions


 U A /U D                     utility from attack/defense




 RA / RD                      flow resource commitment this period to attack/defense




 K A / KD                     state of knowledge in attack/defense at time t




 K A / K D                  instantaneous change in state of knowledge at time t



 Parameters
 η                            discount rate

 δ                            state of knowledge depreciation

 ν A /ν D                     fraction of flow resources to attack/defense this period that
                              increases the state of knowledge beyond one period
Table 2: Parameter Values in Sensitivity Analyses
                                                Relative
 Value of
                                                damage
 Parameters
               Parameters in Contest Success    valuation
 in One                                                         Equation of Motion        Discount
                                                of
 Way                    Function                                   Parameters             Rate
                                                attacker
 Sensitivity
                                                to
 Analyses
                                                defender

                                                                         fraction of
                                                                         flow
                                                                         resources to
               relative                                                  attack/defense
                                                            state of     this period
               efficiency production bounded
 Sensitivity                         rationality ψ = G A    knowledge    that increases     η
 Analyses                 share                      GB     depreciation the state of
                          parameter ( ω )                   (δ )
               (σ )                                                      knowledge
                          (αA =αD )
                                                                         beyond one
                                                                         period

                                                                         (ν A ,ν D )

 Base Case        1          .6           0         1           .1               .5         .05
    SA 1          2          .6           0         1           .1               .5         .05
    SA 2          .5         .6           0         1           .1               .5         .05
    SA 3          1          .2           0         1           .1               .5         .05
    SA 4          1          .8           0         1           .1               .5         .05
    SA 5          1          .6           0         2           .1               .5         .05
    SA 6          1          .6           0        .5           .1               .5         .05
    SA 7          1          .6           0         1           .1              .25         .05
    SA 8          1          .6           0         1           .1              .75         .05
Table 3: Steady State Resource Commitments
                     Attacker                                Defender
        Resources as a   Resources as a      Resources as      Resources as a     Prob
        Fraction of      Fraction of         a Fraction of     Fraction of
        Damages          Expected Damages    Damages           Expected Damages

 Base
             0.22               0.43             0.22                   0.43      0.50
 Case
 SA 1        0.19               0.58             0.19                   0.58      0.33
 SA 2        0.19               0.29             0.19                   0.29      0.67
 SA 3        0.18               0.37             0.18                   0.37      0.50
 SA 4        0.23               0.47             0.23                   0.47      0.50
 SA 5        0.39               0.58             0.19                   0.29      0.67
 SA 6        0.10               0.29             0.19                   0.58      0.33
 SA 7        0.22               0.43             0.22                   0.43      0.50
 SA 8        0.22               0.43             0.22                   0.43      0.50
References
Aleexev, Alexander and Kerry Krutilla, 2015. “Cyber-Attack as a Contest Game.” In A.Kott
      (ed.) Proceedings of the NATO IST-128 Workshop: Assessing Mission Impact of
      Cyberattacks. US Army Research Laboratory, ARL-SR-0349, pp. 66-74, 2015.
      www.arl.army.mil/www/default.cfm?technical_report=7602.

Anderson, Ross and Tyler Moore, 2006, “The Economics of Information Security,” Science, 314,
      610-613. Accessed at: http://tylermoore.ens.utulsa.edu/science-econ.pdf

Baryshnikov, Yuliy, 2012, “IT Security Investment and Gordon-Loeb’s 1/3 Rule,” Workshop on
      the Economics of Information Security (WEIS 2012). Accessed at:
      http://www.econinfosec.org/archive/weis2012/papers/Baryshnikov_WEIS2012.pdf

Cavusoglu, Huseyin, Birendra Mishra and Srinivasan Raghunathan, 2004, “A Model for
      Evaluating IT Security Investment,” Communications of the ACM, vol. 47, no. 7, 87-92.
      Accessed at: http://utd.edu/~huseyin/paper/investment.pdf

Clarke and Knake, 2010, Cyberwar: The Next Threat to National Security and What to Do about
       It. New York: Harper Collins.

Cox, Joseph, 2016, “A Brief Interview with The Shadow Brokers, The Hackers Selling NSA
       Exploits,” Motherboard. Accessed at: https://motherboard.vice.com/en_us/article/a-brief-
       interview-with-the-shadow-brokers-the-hackers-selling-nsa-exploits

Cox, Joseph, 2017, “Here's a DEA Invoice for Zero-Day Exploits.” Motherboard. Accessed at:
       https://motherboard.vice.com/en_us/article/heres-a-dea-invoice-for-zero-day-exploits

Gordon, Lawrence A. and Martin P. Loeb, 2002, “The Economics of Information Security
      Investment,” ACM Transactions on Information and Systems Security, vol. 5, no. 4, 438-
      457.

Hampson, Fen and Eric Jardine, 2016, Look Who’s Watching: Surveillance, Treachery and Trust
     Online. Waterloo: Centre for International Governance Innovation Press.

Healy, Jason, ed., 2012, A Fierce Domain: Conflict in Cyberspace, 1996-2012. New York:
       Atlantic Council.
Huang, C. Derrick, Qing Hu and Ravi S. Behara, 2008, “An Economic Analysis of the Optimal
       Information Security Investment in the Case of a Risk-Averse Firm,” Int, J. Production
       Economics, vol. 114, 793-804.

Kaplan, Fred, 2016, Dark Territory: The Secret History of Cyber War. New York: Simon &
      Schuster.

Krutilla, Kerry and Alexander Alexeev, 2012, “The Normative Implications of Political
Decision-Making for Benefit-Cost Analysis.” Journal of Benefit-Cost Analysis, 3(2): Article 2,
2012
NCCIC/FBI, 2016, “GRIZZLY STEPPE – Russian Malicious Cyber Activity.” Accessed at:
     https://www.us-cert.gov/sites/default/files/publications/JAR_16-
     20296A_GRIZZLY%20STEPPE-2016-1229.pdf

NIST, 2017, “Framework for Improving Critical Infrastructure Cybersecurity.” Accessed at:
       https://www.nist.gov/sites/default/files/documents////draft-cybersecurity-framework-
       v1.11.pdf

Rid, Thomas, 2013, Cyberwar Will Not Take Place. New York: Oxford University Press.

Rid, Thomas and Ben Buchanan, 2015, “Attributing Cyber Attacks,” Journal of Strategic
       Studies, vol. 38, no. 1-2, 4-37. http://dx.doi.org/10.1080/01402390.2014.977382

Roberts, Daniel, 2016, “Tom Ridge: Cyber attacks are now worse than physical attacks.” Yahoo!
       Finance. Accessed online at: http://finance.yahoo.com/news/tom-ridge-cybersecurity-
       attacks-are-now-worse-than-physical-attacks-170426390.html?soc_src=social-
       sh&soc_trk=tw

Romanosky, Sasha, 2016, “Examining the Cost and Causes of Cyber Incidents.” Journal of
     Cybersecurity, Vol. 2, no. 2, 1-11. DOI: https://doi.org/10.1093/cybsec/tyw001

Stiennon, Richard, 2015, There Will be Cyberwar: How the Move to Network-Centric War
       Fighting Has Set the Stage for Cyberwar. New York: IT-Harvest Press.

Tsagourias, Nicholas, 2012, “Cyber attacks, self-defence and the problem of attribution.” Journal
      of Conflict and Security Law, vol. 17, no. 2, 229-244. https://doi.org/10.1093/jcsl/krs019

United Nations, 2015, “70/237. Developments in the field of information and
       telecommunications in the context of international security,” Resolution adopted by the
       General Assembly on 23 December 2015. Available at: https://unoda-web.s3-
       accelerate.amazonaws.com/wp-content/uploads/2016/01/A-RES-70-237-Information-
       Security.pdf

Valeriano, Brandon and Ryan C. Maness, 2015, Cyberwar Versus Cyber Realities: Cyber
       Conflict in the International System. New York: Oxford University Press.

White House, 2016, “FACT SHEET: Cybersecurity National Action Plan.” Accessed at:
        https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-
        cybersecurity-national-action-plan
Zetter, Kim, 2014, Count Down to Zero Day: Stuxnet and the Launch of the World’s First
        Digital Weapon. New York: Broadway Books.