Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Table 3

Optimal with different attack arrivals.

ParametersExpected cyber cost Optimal IT spending Expected number of breaches

, $7.22$1.020.26
, $7.31$0.380.33
, $1.45$0.490.02