Research Article
Modeling the Effect of Spending on Cyber Security by Using Surplus Process
Table 3
Optimal
with different attack arrivals.
| Parameters | Expected cyber cost | Optimal IT spending | Expected number of breaches |
| , | $7.22 | $1.02 | 0.26 | , | $7.31 | $0.38 | 0.33 | , | $1.45 | $0.49 | 0.02 |
|
|