<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v3.0 20080202//EN" "http://dtd.nlm.nih.gov/publishing/3.0/journalpublishing3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="3.0" xml:lang="en" article-type="research article">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">
    jis
   </journal-id>
   <journal-title-group>
    <journal-title>
     Journal of Information Security
    </journal-title>
   </journal-title-group>
   <issn pub-type="epub">
    2153-1234
   </issn>
   <issn publication-format="print">
    2153-1242
   </issn>
   <publisher>
    <publisher-name>
     Scientific Research Publishing
    </publisher-name>
   </publisher>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="doi">
    10.4236/jis.2025.162012
   </article-id>
   <article-id pub-id-type="publisher-id">
    jis-141700
   </article-id>
   <article-categories>
    <subj-group subj-group-type="heading">
     <subject>
      Articles
     </subject>
    </subj-group>
    <subj-group subj-group-type="Discipline-v2">
     <subject>
      Computer Science 
     </subject>
     <subject>
       Communications
     </subject>
    </subj-group>
   </article-categories>
   <title-group>
    Prioritizing Defense in Depth Measures Using Artificial Intelligence (AI) and the Expected Utility Hypothesis
   </title-group>
   <contrib-group>
    <contrib contrib-type="author" xlink:type="simple">
     <name name-style="western">
      <surname>
       Rodney
      </surname>
      <given-names>
       Alexander
      </given-names>
     </name>
    </contrib>
   </contrib-group> 
   <aff id="affnull">
    <addr-line>
     aCochise College, Sierra Vista, USA
    </addr-line> 
   </aff> 
   <pub-date pub-type="epub">
    <day>
     31
    </day> 
    <month>
     03
    </month>
    <year>
     2025
    </year>
   </pub-date> 
   <volume>
    16
   </volume> 
   <issue>
    02
   </issue>
   <fpage>
    227
   </fpage>
   <lpage>
    251
   </lpage>
   <history>
    <date date-type="received">
     <day>
      20,
     </day>
     <month>
      February
     </month>
     <year>
      2025
     </year>
    </date>
    <date date-type="published">
     <day>
      28,
     </day>
     <month>
      February
     </month>
     <year>
      2025
     </year> 
    </date> 
    <date date-type="accepted">
     <day>
      28,
     </day>
     <month>
      March
     </month>
     <year>
      2025
     </year> 
    </date>
   </history>
   <permissions>
    <copyright-statement>
     © Copyright 2014 by authors and Scientific Research Publishing Inc. 
    </copyright-statement>
    <copyright-year>
     2014
    </copyright-year>
    <license>
     <license-p>
      This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/
     </license-p>
    </license>
   </permissions>
   <abstract>
    The purpose of this research was to determine whether Artificial Intelligence (AI) and the Expected Utility Hypothesis can be effectively applied to the prioritization of defense in-depth security tools and procedures to reduce cyber threats. The way this was determined, or methods used in this study consisted of using AI (Microsoft CoPilot) to rank the current top 10 cybersecurity threats and the cybersecurity defense in depth utilities that are designed to reduce those threats. The methods further involved using the Likert Scale Model to create an ordinal ranking of the cybersecurity threats. The defense in depth utilities and procedures were then compared to see whether AI (CoPilot), the Likert scale and the Expected Utility Hypothesis could be effectively applied to prioritize and combine the measures to reduce cyber threats. The results of this research reject the H
    <sub>0</sub> null hypothesis that AI and the Expected Utility Hypothesis does not affect the relationship between prioritization and combining of defense in depth utilities and procedures (independent variables) and related cyber threats (dependent variables).
   </abstract>
   <kwd-group> 
    <kwd>
     Artificial Intelligence (AI)
    </kwd> 
    <kwd>
      Expected Utility Hypothesis (EUH)
    </kwd> 
    <kwd>
      Information Assurance
    </kwd> 
    <kwd>
      Defense in Depth
    </kwd> 
    <kwd>
      Information Technology
    </kwd> 
    <kwd>
      Network Security
    </kwd> 
    <kwd>
      Cybersecurity
    </kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <sec id="s1">
   <title>1. Introduction</title>
   <p>The research background in cyber security defense-in-depth (DiD) prioritization included a literary review of recent cyber security breaches and how organizational network security managers prioritize their network defenses to prevent those breaches. An analysis of former cyber security prioritization research disclosed that organizational network security managers need to use additional systematic decision-making approaches when prioritizing their network defenses. To summarize the problem involving former research, network security managers need additional decision theories when deploying their defenses.</p>
   <p>This research introduced using the Expected Utility Hypothesis, artificial intelligence (AI) and the Likert scale to give network security managers an additional systematic way to prioritize their network defenses. The dependent variables of cyber threats were determined to see whether they could be influenced by the independent variables (prioritized defense in depth tools and procedures) to reduce organizational cyber breaches. The independent variables of defense in depth tools and procedures were determined to be effective means used by security managers to counter cyber threats.</p>
   <p>Microsoft Security Copilot plays a significant role in the prioritization of cybersecurity threats by leveraging AI to enhance the efficiency and effectiveness of security operations. Security Copilot integrates with Microsoft Defender Threat Intelligence to provide contextual threat intelligence, helping security teams understand and prioritize threats based on their exposure level <xref ref-type="bibr" rid="scirp.141700-1">
     [1]
    </xref>. It offers step-by-step guidance for incident response, including triage, investigation, containment, and remediation <xref ref-type="bibr" rid="scirp.141700-1">
     [1]
    </xref>. Microsoft ensures that Security Copilot’s output is reliable and accurate through several validation checks <xref ref-type="bibr" rid="scirp.141700-2">
     [2]
    </xref>. This includes checks for harmful actions, stereotypes, personal information exposure, and more. These checks are performed during the manifest validation and processing of user prompts <xref ref-type="bibr" rid="scirp.141700-2">
     [2]
    </xref>.</p>
   <p>Cyber-attacks can be reduced by deploying security tools and procedures. Cybersecurity should be applied commensurately with the risk and the value of the asset requiring protection <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>. Critical infrastructure requires the highest security priority.</p>
   <p>In the field of cyber security, threats have evolved such that they are usually complex interactions between an assailant (the “threat actor”) and the target system <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>. Hackers will try to use elaborate artificial intelligence (AI) means to intrude systems. Although implementation of technological solutions is the usual respond to security threats and vulnerabilities, wireless security is primarily a management issue <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>.</p>
   <p>How the network security manager designs and implements a network will influence how well the network is protected. Defense in depth (DiD) prevents network intrusions by deploying tools and procedures such as firewalls, access control and detection. Most of the systems use robust a architecture to enhance business and reduce costs by increasing the integration of external, business, and control system networks <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>.</p>
   <p>The large organizations can use Expected Utility Hypothesis and AI to improve the security on their networks. The DiD strategy recommends a balance between protection capability and cost, performance, and operational considerations <xref ref-type="bibr" rid="scirp.141700-5">
     [5]
    </xref>. Defense-in-depth is an important security architecture principle that has significant application to industrial control systems (ICS), cloud services, storehouses of sensitive data, and many other areas <xref ref-type="bibr" rid="scirp.141700-6">
     [6]
    </xref>.</p>
   <p>Artificial intelligence gives organizations the opportunity to data mine social networks for hackers; social networks have become an important part of organizational operations. Millions of people use various forms of social networks as they allow individuals to connect with friends and family and share private information <xref ref-type="bibr" rid="scirp.141700-7">
     [7]
    </xref>. Social networks and AI have become effective ways to hunt threats and discover vulnerabilities.</p>
   <p>The concept of defense in depth is adopted from military defense where different obstacles are deployed to eventually expend the resources of attacker <xref ref-type="bibr" rid="scirp.141700-7">
     [7]
    </xref>. A hacker’s time, skills and funding can be exhausted by deploying defensive barriers centered on loss of privacy prevention, for example. The Expected Utility Hypothesis can help organizations determine the most effective ways to exhaust an attacker’s resources.</p>
   <p>During this process, one or more intermediate target devices (e.g., DNS servers, routers, etc.) may be used to gain progressively deeper access to the target network to approach the target system <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>. The overall security objectives remain the same: preserving confidentiality, ensuring integrity, and maintaining availability of the information and information systems <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>. The Expected Utility Hypothesis is a fundamental concept in economics and decision theory. It suggests that when faced with uncertainty, rational agents make decisions by maximizing their expected utility <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>.</p>
   <p>The reduction of security threats to organizational networks is maximizing the utility of tools and procedures designed to reduce those threats. By deploying the same defenses on the internal network as on the external edge, the network can secure itself and other networks <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>.</p>
   <p>Using AI and EUH, for example firewalls can be combined to secure different segments of the network.</p>
   <p>At a high level, the threat actor can use several techniques to breach the target network, by passing the defensive devices and either installing malicious code on a target system or directly accessing the target system <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>. There are many tools available on the Internet which will allow hackers to breach systems, access networks and steal data. When considering the most logical route an attacker will take in compromising a control network, it is easy to visualize an attack path that pries deeper and deeper into the architecture <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>.</p>
   <p>An attacker will try to access the core of a system to steal or manipulate privacy data. A Social Network Service (SNS) is a kind of web service for establishing a virtual connection between people with similar interests, backgrounds, and activities <xref ref-type="bibr" rid="scirp.141700-6">
     [6]
    </xref>. People with the same hobbies and work environments need to keep network security in mind when using social media networks.</p>
   <p>Effective management of the threats associated with technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>. Artificial intelligence can be used to identify threats to a network and to develop plans to mitigate those threats. Identifying critical assets based on a risk assessment is a good starting point, but security must not end there <xref ref-type="bibr" rid="scirp.141700-2">
     [2]
    </xref>.</p>
   <p>Once critical assets are identified, a security blanket must be developed around the organizational critical assets. Once the target system is compromised, the threat actor can then act upon target data and/or target systems or intermediate systems in some way that achieves a malicious goal <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>. A hacker gains access to sensitive data by compromising vulnerable systems.</p>
   <p>The main thrust of the research is to indicate that individuals are rational and make decisions by weighing the potential benefits and risks in a way that maximizes their overall satisfaction or utility <xref ref-type="bibr" rid="scirp.141700-9">
     [9]
    </xref>. The physical network security tool, i.e. a network intrusion detection system (NIDS) is mapped against the hidden process of intrusion reduction in this research. The expected utility hypothesis can be deployed in the information assurance planning process.</p>
   <p>The logic of the theory can easily be extended to decisions about selecting goals or managerial strategy <xref ref-type="bibr" rid="scirp.141700-10">
     [10]
    </xref>. Can we predict the time of the next eruption of Old Faithful Geyser from the length of the most recent eruption <xref ref-type="bibr" rid="scirp.141700-11">
     [11]
    </xref>? The number of organizational security breaches can be predicted based on the type of layered defenses used to secure those organizational networks. This is a task perfectly designed for AI.</p>
   <p>Instead of focusing on feature-centric network defense requirements, the defense in depth (DiD) model should be redesigned to be a functional or capability focused model <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>. Defense in depth priorities and focus should align with current threats, for example DDOS and DOS attacks. Exemplary actions on the target data can include but are not limited to theft of data exfiltration), destruction of data, modification of data, or Some combination thereof <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>.</p>
   <p>While on the Internet, user passwords can be stolen as well as bank information and medical records. The Expected Utility Hypothesis posits that when faced with various options and uncertain outcomes, a rational agent will choose the option that maximizes their expected utility. This concept was first introduced by Daniel Bernoulli in the 18th century in response to the famous St. Petersburg Paradox <xref ref-type="bibr" rid="scirp.141700-12">
     [12]
    </xref>. Network security outcomes can be predicted using EUH based on the deployment of certain defense in depth security tools.</p>
   <p>Decision theory provides a normative framework for representing and reasoning about decision problems under uncertainty <xref ref-type="bibr" rid="scirp.141700-13">
     [13]
    </xref>. The ambiguity of deciding which defense in depth measures to use to reduce network intrusions can be solved using this modeling principle.</p>
   <p>The purpose of this statistical analysis is to give organizational network security a clearer picture on how to manage the difficult multi criteria decision making problem associated with network security.</p>
   <p>Symmetry in the DiD model allows for the network defense system to recognize the insider threat, preventing data exfiltration and allowing attacks to be stopped at the originating network instead of being defended by the attacked network <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>. At its core, the Expected Utility Hypothesis involves assigning a utility value to each possible outcome of a decision <xref ref-type="bibr" rid="scirp.141700-14">
     [14]
    </xref>. The reduction of security threats to an organizational network can be shown by using EUH.</p>
   <p>The idea behind the defense in depth approach is to defend a system against any attack using several independent methods <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>. Defense in depth measures should be arrayed against threats to attack them from several different directions. Wireless Networks present a host of issues for network managers <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>. Network security managers face varying threats when it comes to wireless networks.</p>
   <p>In today’s rapidly changing world, networks change daily, software is updated weekly, and threats may change by the hour <xref ref-type="bibr" rid="scirp.141700-3">
     [3]
    </xref>. Computer networks are fluid environments which require the constant attention of network security managers. Statistical methods are important for exploring the relationships between variables and can be applied to many studies <xref ref-type="bibr" rid="scirp.141700-15">
     [15]
    </xref>.</p>
   <p>Expected Utility Hypothesis can be significant in exploring the relationship between network security threat variables and defense in depth security tool variables. Dynamic defenses must also be enabled, which change attack surfaces to proactively defend a network <xref ref-type="bibr" rid="scirp.141700-8">
     [8]
    </xref>. Defense in depth intrusion detection systems can adjust to the changing nature of attacks.</p>
   <p>Unauthorized access points, broadcasted SSIDs, unknown stations, and spoofed MAC addresses are just a few of the problems addressed in WLAN <xref ref-type="bibr" rid="scirp.141700-4">
     [4]
    </xref>. Most of these threats are specific to wireless networks, especially during times when people are working from home and learning from home. This research study explores whether the Expected Utility Hypothesis and AI can be effectively applied to the array of information assurance defense in-depth measures to mitigate network security threats.</p>
   <sec id="s1_1">
    <title>1.1. Network Security Threats</title>
    <p>A “peel-the-onion” analysis shows that an attacker trying to affect a critical infrastructure system would most likely be after the core control domain <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. This study uses the Likert Scale to rank network security threats (<xref ref-type="table" rid="table1">
      Table 1
     </xref>) and their corresponding defense in depth security measures which will assist network security managers in prioritizing their network resources.</p>
    <p>Rank correlations also work well with ordinal rating data, and continuous data are reduced to their ranks <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>.</p>
    <table-wrap id="table1">
     <label>
      <xref ref-type="table" rid="table1">
       Table 1
      </xref></label>
     <caption>
      <title>
       <xref ref-type="bibr" rid="scirp.141700-"></xref>Table 1. Top ten network security threat prioritization.</title>
     </caption>
     <table class="MsoTableGrid custom-table" border="0" cellspacing="0" cellpadding="0"> 
      <tr> 
       <td class="custom-bottom-td acenter"><p style="text-align:center">Priority</p></td> 
       <td class="custom-bottom-td acenter"><p style="text-align:center">Threat</p></td> 
      </tr> 
      <tr> 
       <td class="custom-top-td acenter"><p style="text-align:center">1</p></td> 
       <td class="custom-top-td acenter"><p style="text-align:center">Malware</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">2</p></td> 
       <td class="acenter"><p style="text-align:center">Phishing</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">3</p></td> 
       <td class="acenter"><p style="text-align:center">Man-in-the-Middle (MitM)</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">4</p></td> 
       <td class="acenter"><p style="text-align:center">Denial of Service (DoS)</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">5</p></td> 
       <td class="acenter"><p style="text-align:center">SQL Injections</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">6</p></td> 
       <td class="acenter"><p style="text-align:center">Zero Day Exploits</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">7</p></td> 
       <td class="acenter"><p style="text-align:center">Insider Threats</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">8</p></td> 
       <td class="acenter"><p style="text-align:center">Advanced Persistent Threats (APT)</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">9</p></td> 
       <td class="acenter"><p style="text-align:center">Credential Theft</p></td> 
      </tr> 
      <tr> 
       <td class="acenter"><p style="text-align:center">10</p></td> 
       <td class="acenter"><p style="text-align:center">IoT Vulnerabilities</p></td> 
      </tr> 
     </table>
    </table-wrap>
    <p>These attacks attempt to deliberately modify information shared within the smart grid to corrupt critical data exchange in the smart grid <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Malware can destroy data and functions designed to operate and control the smart grid. An increasing number of wireless devices are abused for illicit cybercriminal activities, including malicious attacks, computer hacking, data forging, financial information theft, online bullying/stalking <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>.</p>
    <p>Users should be extremely careful while social distancing and using wireless networks. The target of the attacks is either customer information (e.g., pricing information and customer account balance) or network operation information (e.g., voltage readings, device running status) <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Network intruders may attempt to disrupt this smart grid data traveling over the Internet. Malicious attacks targeting network availability can be considered as denial-of-service (DoS) attacks <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>.</p>
    <p>If networks become unavailable, then working from home or distance learning will come to a screeching halt. This causes the direct loss of about 83 billion euros with an estimated 556 million users worldwide impacted by cybercrime each year, according to the 2012 Norton cyber-crime report <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Cybercrime is responsible for large financial losses to the global economy; this is something to keep in mind while working from home.</p>
    <p>Ad-hoc networks can pose a security threat <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. A Bluetooth connection, for example, has fewer security controls than a managed wireless network. Differing from attacks targeting network availability, attacks targeting data integrity can be regarded as less brute force yet more sophisticated attacks <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Integrity attacks can try to discredit the integrity and data privacy of sensitive data.</p>
    <p>The new paradigm of global availability in networks offered by IPv6, must also be accounted for <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Because of social distancing requirements and remote computing, global cloud security must be included in an organization’s security structure. Threat actors can gain access to credentials for normal or privileged access to the target network <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Thieves may pay inside workers for compromising information.</p>
    <p>An unauthorized node in a wireless network is capable of inflicting intentional interferences with the objective of disrupting data communications between legitimate users <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Denial of service attackers can cause havoc for Internet users. Since network availability is the top priority in the security objectives for the smart grid, we use experiments to quantitatively evaluate the impact of denial-of-service (DoS) attacks on a power substation network <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>.</p>
    <p>A denial of service (DOS) attack could potentially plunge entire regions into darkness.</p>
    <p>An attacker must then not only compromise security controls at the perimeter but must be able to compromise each layer behind the perimeter to reach the critical asset <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. While we are learning from home an attack is less likely to be successful if an attacker must breach multiple obstacles. A major difference between the smart grid and the Internet is that the smart grid is more concerned with the message delay than the data throughput due to the timing constraint of messages transmitted over the power networks <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Denial of service attacks can prevent critical smart grid messages from reaching their final destinations.</p>
    <p>Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. It is important to keep in mind while social distancing that both friends and enemies have access to wireless networks because wireless networks transmit over the airways.</p>
   </sec>
   <sec id="s1_2">
    <title>1.2. Defense in Depth Security Strategy</title>
    <p>The first defense approach is prevention <xref ref-type="bibr" rid="scirp.141700-17">
      [17]
     </xref>. The first defense in depth measure that a network security manager should take is to protect the network and the data that crosses the network. The network should especially be protected in a way that allows users to safely work and learn from home.</p>
    <p>The next defense approach is detection <xref ref-type="bibr" rid="scirp.141700-17">
      [17]
     </xref>. Detective measures are taken to reveal the presence of attacks and intrusions that have compromised or circumvented preventive mechanisms <xref ref-type="bibr" rid="scirp.141700-17">
      [17]
     </xref>. It is important to deploy defense in depth tools such as NIDS that can identify potential attacks such as Trojans.</p>
    <p>Though firewalls, IDSs, and IPSs are ineffective network security systems when deployed by themselves, layering them provides additional protection <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Deploying defense measures as a unit increases their effectiveness. In the event there is a security-related incident in the controls system domain, activities to recognize, respond, mitigate, and resume need to be established <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>.</p>
    <p>Security planning and operations should take place before, during and after a security breach. For example, installing up to date antivirus is critical before breach operation. Incident response consists of policies, procedures, and technical measures that enable the identification of potential cyber intrusions and the structure to react to and remediate the event <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. Tactically, security is incomplete without proper assessment of assets, risks associated with them and policies to control these risks; the outermost layer of the model covers all these aspects <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>.</p>
    <p>Organizations must consider the risk to organizational assets before establishing remote connections due to social distancing requirements. Each of these defensive devices have been created to act upon specific types of threats and when used in combination can theoretically help prevent, limit, or detect the attack of a threat actor, resulting in better safety for target data and target systems <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. If a hacker can bypass one defensive tool they can be stopped by another defensive tool and user data can remain safe.</p>
    <p>Defensive strategies that secure each of the core zones can create a defensive strategy with depth <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. In information security terms, administrators or organizations deploy layers of defensive measures to minimize risk of unauthorized access or information attacks <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. The defensive layer of an UpToDate antivirus, for example, can help reduce the risk of identity theft.</p>
    <p>Deflection is a means of diverting attackers from the valuable assets to a faux environment where their techniques and methods can be studied <xref ref-type="bibr" rid="scirp.141700-17">
      [17]
     </xref>. Honey pots can be used to deflect users away from sensitive areas where sensitive data may be stored. Security issues are not solved magically but administrators must evaluate different methodologies to consider as best practice for their organization <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>.</p>
    <p>Network security managers should develop the best defense-in-depth strategy that fits their organization. For example, if Trojans are a concern they should focus on firewalls and Network Intrusion Detection Systems (NIDS). Information assurance (IA) mechanisms may be subdivided into three categories: preventive, corrective and detective <xref ref-type="bibr" rid="scirp.141700-18">
      [18]
     </xref>. Organizations can remain safe from attacks by using the defense in depth measures of protection, identifying potential attacks, and removing them.</p>
    <p>Target organizations typically take action to prepare and assess their security posture to locate holes in their security systems <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Network security managers are constantly looking for areas in their networks that can be breached by hackers while employees are remotely working because of social distancing requirements. Overlapped layers can cover shortcomings of one layer by another <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Encryption can also be overlapped within the network to cover firewall shortcomings.</p>
    <p>The strategy recommends a balance between the protection capability and cost, performance, and operational considerations <xref ref-type="bibr" rid="scirp.141700-6">
      [6]
     </xref>. Organizational defense in depth requires strategic planning. Development of a defense-in-depth strategy starts with mapping the control systems architecture <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>.</p>
    <p>Network security managers must have intimate knowledge of the network to understand how to effectively deploy a defense in depth strategy. The DiD model uses layers of different network protection devices to create a secure network <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. UpToDate antivirus is one example of a measure that can be deployed in the defense in depth model.</p>
    <p>Layer 1 focuses on perimeter security and the controls surrounding the protection of the ingress/egress point of the substation electronic security perimeter <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. The first level of protection is entry into the network. This can involve a remote connection or VPN.</p>
    <p>Layer 2 focuses on the security controls for communication and devices that perform data aggregation <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. The second level are the areas where critical data is stored, databases containing sensitive organizational data for example. Layer 3 focuses on host-based cybersecurity controls used to provide security at the device level <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. The final protection level involves protecting individual devices, for example, laptops, desktops and servers.</p>
    <p>No single security solution will keep a determined thief from the goal of compromising the hardware or software given enough time and resources <xref ref-type="bibr" rid="scirp.141700-14">
      [14]
     </xref>. Loss of privacy can be reduced by deploying defensive tools in the path of the attacker. A single strategy to defense information and its associated components may not be sufficient <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>.</p>
    <p>Multiple layered defense measures are required to protect organizational systems while employees work from home. Historically, a military defender would build a series of defensive positions and fall back as the attacker advanced, eventually defeating the attacker <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Confidentiality should be built on the onion approach with the most sensitive data being in the middle and hardest for an attacker to reach.</p>
    <p>Instead of attempting to prevent inbound attacks and blocking specific forms of outbound traffic, a functional DiD model should look to deploy defenses that are symmetric <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Defense in depth can be designed to prevent both internal and external data theft. The DoD Defense-In-Depth model is extended to logical, layered, and virtual “boundaries” beyond more traditional physical and geographic boundaries <xref ref-type="bibr" rid="scirp.141700-18">
      [18]
     </xref>.</p>
    <p>Cloud or logical boundaries have enhanced the capabilities of traditional defense in depth strategies. Having multiple DMZs protects the information resources from attacks using Virtual-LAN (VLAN) hopping and trust exploitation <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Data can be processed in secure zones which are harder for hackers to reach. Dynamic defenses can be enabled both through dynamic computing platforms and dynamic network addressing <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>.</p>
    <p>Demilitarized zones (DMZ) can be dynamically established using DHCP to segment and block traffic. A tool such as encryption can be combined with firewalls, NIDS and authentication to create repeated barriers to defeat attackers <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. These systems, when layered together, create a system of defense known as Defense-in Depth, where each layered defensive device prevents a deeper level of attack.</p>
    <p>Each layer in defense in depth architecture has heterogeneous implementation of security controls which results in administration overhead <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Each defensive player must be configured separately by a security manager or an administrator. Multilayer security puts the critical assets at the most reliable and secure layer <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>.</p>
    <p>Sensitive organizational data, for example, should be placed in the most critical level of the defense in depth strategy. A DMZ is an exceptionally good way to enhance the security posture and add another layer to the defense-in-depth strategy <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Systems used by employees working from home can be placed in a secure zone (DMZ) which protects their communications.</p>
    <p>With multiple layers, each layer can have unique yet complementary security controls <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. Phishing attacks can be reduced with specific but supportive defensive layers. Defense in depth is based on layered architecture; every layer has its own implementation <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Although defense measures may cover vulnerabilities that others miss. Each requires individual configuration.</p>
    <p>Differentiating between similar attacks like phishing and spear-phishing is crucial for effective threat prioritization. Here are some strategies to prioritize and differentiate these overlapping threat categories. Analyze the context of the attack. Spear-phishing attacks often contain personalized information, such as the recipient’s name, job title, or specific details about the organization <xref ref-type="bibr" rid="scirp.141700-19">
      [19]
     </xref>.</p>
    <p>Phishing attacks, on the other hand, are more generic <xref ref-type="bibr" rid="scirp.141700-19">
      [19]
     </xref>. Verify the source of the email or message. Spear-phishing attacks may appear to come from a trusted source within the organization, while phishing attacks often use generic or spoofed email addresses <xref ref-type="bibr" rid="scirp.141700-20">
      [20]
     </xref>.</p>
   </sec>
   <sec id="s1_3">
    <title>1.3. Defense in Depth Security Tools and Procedures</title>
    <p>Effective security policies and procedures are the first step to a secure control systems network <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. It is important for organizations to outline in detail how they will protect their data from network intrusions. The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>.</p>
    <p>Using authentication and encryption is the most effective way to secure wireless networks. A well-defined and well implemented defense in depth strategy prevents a wide variety of attacks and generates real-time intrusion alarms to the administrators <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Network Intrusion Detection Systems NIDS can tell network security managers when their network is being attacked and steps necessary to prevent the attack.</p>
    <p>There are several common methods for monitoring a network for unusual or unauthorized activity, with one of the most effective being Intrusion Detection Systems (IDS) <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Illegal access to systems can be monitored and blocked by several devices before intruders can steal data. Network Security Situation Awareness (NSSA) is a new notion deriving from Air Traffic Control (ATC) <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>.</p>
    <p>Knowing where the attacks are occurring is an important step in stopping an attack. Ensure that Software is up-to-date, systems are appropriately configured on its network, and access is appropriately controlled <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Software must be properly patched to prevent zero-day attacks.</p>
    <p>Informing personnel of their responsibilities when it comes to cybersecurity is an important step in implementing and enforcing policies and procedures <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. Employee training and an effective security awareness campaign are critical to a successful cybersecurity program for example security necessary to maintain Confidentiality. The next generation cyberspace intrusion detection systems will fuse data from heterogeneous distributed network sensors to create cyberspace situational awareness, and analogized cyberspace situational awareness with ATC <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>.</p>
    <p>Sensors can be deployed to spot phishing attacks that are designed to breach critical systems. Over time, there have been two key practices for this assessment: tabletop exercises and penetration tests <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Security managers should use these tools to assess their networks to ensure they are effective at preventing breaches such as phishing attacks which are designed to steal passwords.</p>
    <p>Specific fingerprinting and operating system detection can be used to profile attacker activities, skill level and motivations <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>. What an attacker is trying to achieve can be viewed in real time. To maintain confidential transmission, existing systems typically employ cryptographic techniques for preventing eavesdroppers from intercepting data transmissions between legitimate users <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>.</p>
    <p>The defense in depth measure encryption can help stop man-in-the-middle attackers from disrupting and intercepting Internet communications. If the message is not encrypted, or encrypted with a weak algorithm, the attacker can read it, thereby compromising confidentiality <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Authentication and encryption are critical to wireless network security especially while working from home and learning from home.</p>
    <p>Situational awareness was defined by Endsley as “the perception of the elements in the environment with a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future” <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>. Multi-factor Authentication can be used to deter an attacker for a limited amount of time. At the point that the authentication expires the user should reauthenticate. This intelligence is vital for initiating appropriate responses and for law enforcement investigations <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>. Cybersecurity forensics can benefit by capturing this data.</p>
    <p>Penetration tests are live fire exercises in which White Hat Hackers perform as threat actors and are tasked with attempting to infiltrate the target network, access the target systems <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. White hat hackers are hackers hired by the organization to identify system security weaknesses which might possibly disrupt critical activities. Network situation elements consist of Internet/Intranet (environment), entities in the network including software and hardware, network security events including alerts, logs and files, correlation team and network intrusion behavior <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>.</p>
    <p>The status of the entire must be known to prevent intrusions such as DoS attacks. Anomaly based intrusion detection systems, but care must be taken avoid overwhelming the human operator <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>. Network intrusion detection systems must take the limitations of the security manager into consideration.</p>
    <p>White hat hackers can retrieve a sample of target data to prove that network defense is ineffective, thus locating a route that should be remediated <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Using this tool network security managers can fix network security issues before they cause real security problems. The long-term goal is to create a library of visual signatures that can be used by experts or novice analysts to detect malicious activity <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>.</p>
    <p>Due to the external nature of the penetration tests, they tend to be expensive to execute and are typically undertaken infrequently (usually once or twice a year) <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Unfortunately pen testing is too costly and disruptive and therefore not frequently conducted. NSSA fuses data from tools of IDS, VDS (Virus Detection System), Firewall, Netflow etc., to find what happening in the network <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>.</p>
    <p>Data is collected from several points to see for example when a Man in the middle attack is attacking the network. There are a wide variety of potential visualizations that can be used to display network traffic data in a way that is meaningful for security analysis <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>. Network security managers can see intrusions that are placed on the network from several different views.</p>
    <p>In addition, they usually stop at the first successful breach, resulting in a single Successful breach log and one or more failed breach attempts <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Pen testing is unlikely to discover a vulnerability which can be exploit by an advanced persistent attack (APT) for example man in the middle attacks. These types of attacks put working from home at risk.</p>
    <p>In the MAC layer, the MAC address of a user should be authenticated to prevent unauthorized access <xref ref-type="bibr" rid="scirp.141700-14">
      [14]
     </xref>. To prevent hackers from entering the network, security managers should use MAC authentication. Training is a core component of an overarching security awareness program <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>.</p>
    <p>Because of social distancing requirements, network security training for administrators and users may have to be carried out remotely. Vulnerability scanning is not a passive operation, and as such can produce real-world failures that can impact operations inside of the organization <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Scanning should be done during non or low operational maintenance periods so that it does not disrupt normal organizational network functions.</p>
    <p>Interception and alteration of wireless transmissions represents a form of “man-in-the-middle” attack <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Encryption can stop a man-in-the-middle attacker from viewing the content of the data that he has managed to steal especially during times when people are working from home and learning from home. To secure networks, the DiD model must be viewed as a system of systems and updated with current network defense strategies <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>.</p>
    <p>Latest Encryption algorithms allow systems to securely communicate together with lower risk of privacy or data loss. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Using a wired network is safer than using a wireless one.</p>
    <p>In the network layer, the WPA and theWPA2 are two commonly used network-layer online bullying/stalking <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Authentication is a critical part of defense in depth. Firewalls, for blocking access from or to unwanted locations to or from the defended networks; Intrusion Detection Systems (IDS), for detecting Suspicious traffic on the defended networks <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. The control center receives security events from each element to preprocess and save them in a database before transferring to situation analysis <xref ref-type="bibr" rid="scirp.141700-21">
      [21]
     </xref>.</p>
    <p>Once security data is analyzed, it can be uploaded to create UpToDate antivirus files. Security measures such as Demilitarized Zones (DMZ), firewall, Intrusion detection System (IDS), malware Protection and virtual private networks (VPNs) provide defense in depth strategy that deflect information security attacks aim to gain unauthorized access to an organization asset from the internet or public network <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Along with other measures such as antiviruses these defensive measures are critical for stopping attacks from the Internet.</p>
    <p>New advances in cloud computing allow users to rapidly scale provisioned computing resources to consume DoS and DDoS attacks <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Network intrusion can be severely limited by placing resources in the cloud. Network segmentation has traditionally been accomplished by using multiple routers.</p>
    <p>Firewalls should be used to create DMZs to protect the control network <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. To stop malware such as trojans, firewalls should be used to create protected zones within the network. One problem with tabletop exercises is that they test the theoretical function of the systems under test, not the actual function <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>. Penetration test (pentest) can be used in leu of tabletop exercises to locate system vulnerabilities which hackers may try to exploit.</p>
    <p>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Systems such as firewalls, IDSs and IPSs are still used, but layered with new devices that provide different new capabilities to the network defense system <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Privacy loss can be prevented with both traditional and new devices. Each of these devices acts as an obstacle to the attacker <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Advanced persistent threats (APTs) can be stopped by using successive defensive barriers.</p>
    <p>Defense to stop the threat actors at the earliest point in the attack, and to provide the earliest warning of the presence of threat actors attempting to access a defended network <xref ref-type="bibr" rid="scirp.141700-3">
      [3]
     </xref>.</p>
    <p>While learning from home network security managers try to stop an attacker as far away from user data as possible. Preferably before they gain access to the network.</p>
    <p>Current network defenses are designed around the features of specific network defense tools, such as identifying malware, blocking packets, or analyzing network events <xref ref-type="bibr" rid="scirp.141700-8">
      [8]
     </xref>. Two factor Authentication is designed to stop unauthorized network Intrusion. Malware is very prevalent in operating systems that typically run on laptops, desktops, and server hardware platforms <xref ref-type="bibr" rid="scirp.141700-2">
      [2]
     </xref>. Security managers should ensure that all device firmware updates are installed from a trusted source.</p>
   </sec>
   <sec id="s1_4">
    <title>1.4. Artificial Intelligence (AI)</title>
    <p>Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings <xref ref-type="bibr" rid="scirp.141700-23">
      [23]
     </xref>. Computers can perform some tasks quicker, more efficiently and consistently than humans. Artificial intelligence (AI) is technology that enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy <xref ref-type="bibr" rid="scirp.141700-24">
      [24]
     </xref>. Human learning and problem solving can be enhanced by using AI.</p>
    <p>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Artificial Intelligence (AI) is playing an increasingly significant role in cybersecurity <xref ref-type="bibr" rid="scirp.141700-25">
      [25]
     </xref>. Some of the AI benefits in Cybersecurity include threat detection, automated responses and behavior analysis. In terms of threat detection, AI can analyze vast amounts of data to identify patterns and detect threats in real-time. This enables rapid response and mitigation <xref ref-type="bibr" rid="scirp.141700-25">
      [25]
     </xref>.</p>
    <p>Artificial Intelligence (AI) can enhance automated responses by automating routine tasks such as log analysis and vulnerability scanning, freeing up human analysts for more complex tasks <xref ref-type="bibr" rid="scirp.141700-25">
      [25]
     </xref>. Threat actor behavior can be quickly analyzed by AI systems to uncover malicious behavior. Systems can monitor behaviors, detect phishing attempts, and authenticate users by analyzing data like typing styles and voice patterns <xref ref-type="bibr" rid="scirp.141700-25">
      [25]
     </xref>. Finally, AI can continuously learn from new data, improving its ability to identify and counter emerging threats <xref ref-type="bibr" rid="scirp.141700-25">
      [25]
     </xref>.</p>
    <p>There are some challenges and risks associated with using AI to perform cybersecurity tasks. Cybercriminals can use AI to create highly personalized spear-phishing messages or deepfake voices to deceive employees <xref ref-type="bibr" rid="scirp.141700-26">
      [26]
     </xref>. Attackers can use AI to tamper with data, creating false information that can be used for financial gain or to damage reputations <xref ref-type="bibr" rid="scirp.141700-26">
      [26]
     </xref>. The use of AI in cybersecurity raises ethical questions about privacy, data protection, and the potential misuse of AI technologies <xref ref-type="bibr" rid="scirp.141700-26">
      [26]
     </xref>.</p>
    <p>A few artificial intelligence trends are developing in the field of cyber security. Enhanced AI capabilities will continue to evolve, becoming more sophisticated in detecting and responding to cyber threats <xref ref-type="bibr" rid="scirp.141700-27">
      [27]
     </xref>. Collaboration will be increased collaboration between government agencies, private sector companies, and international partners to advance global AI security best practices <xref ref-type="bibr" rid="scirp.141700-27">
      [27]
     </xref>. Organizations will focus on workforce development, expanding AI expertise within their workforce to ensure they can effectively leverage AI technologies <xref ref-type="bibr" rid="scirp.141700-27">
      [27]
     </xref>. AI is a powerful tool in the fight against cybercrime, but it must be harnessed responsibly and securely <xref ref-type="bibr" rid="scirp.141700-27">
      [27]
     </xref>.</p>
    <sec id="s1">
     <title>2. Theoretical/Conceptual Framework</title>
    </sec>
    <sec id="s2_5">
     <title>Expected Utility Hypothesis</title>
     <p>Expected Utility Hypothesis (EUH) forms the basis for many economic models and can be applied to a wide range of decisions, from financial investments to everyday choices <xref ref-type="bibr" rid="scirp.141700-28">
       [28]
      </xref>. Organizations can use the hypothesis to make cybersecurity decisions. Utility is a measure of the satisfaction or benefit that an individual derives from a particular outcome. It’s subjective and can vary from person to person <xref ref-type="bibr" rid="scirp.141700-8">
       [8]
      </xref>. The utility of certain cybersecurity defense in depth measures, i.e. software updates, can be compared to other measures, i.e. user training.</p>
     <p>A comparative analysis between both AI and EUH in cyber security prioritization approaches reveals that, while both AI and EUH have their strengths and limitations, AI’s speed, adaptability, and scalability make it a more effective approach for prioritizing cybersecurity threats in today’s dynamic and complex threat landscape <xref ref-type="bibr" rid="scirp.141700-29">
       [29]
      </xref>. However, combining AI with EUH can provide a more comprehensive approach, leveraging the strengths of both methods to enhance cybersecurity defenses <xref ref-type="bibr" rid="scirp.141700-29">
       [29]
      </xref>.</p>
     <p>Probability is the likelihood of each possible outcome occurring <xref ref-type="bibr" rid="scirp.141700-8">
       [8]
      </xref>. By using EUH, organizations can calculate the probability that they will become the victim of certain cyber attacks, i.e. malware or SQL injections. Bernoulli’s work laid the foundation for modern expected utility theory, which was further developed by John von Neumann and Oskar Morgenstern in their seminal book “Theory of Games and Economic Behavior” published in 1944 <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>.</p>
     <p>In game theory, expected utility is used to analyze strategic interactions where outcomes depend on the choices of multiple agents <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>. In cybersecurity strategic analysis can be made between cyber threats and defense in depth tools. It helps predict the behavior of individuals in competitive settings, such as auctions, bargaining, and voting <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>.</p>
     <p>Utility functions are a critical component of this hypothesis, providing a way to quantify an individual’s preferences <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>. The utility of defense in depth tools can be matched with the cyber risks that an organization may face. These functions can take various forms depending on the nature of the decision-maker’s risk preferences <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>.</p>
     <p>Risk management practices heavily rely on expected utility theory to assess and mitigate potential losses <xref ref-type="bibr" rid="scirp.141700-31">
       [31]
      </xref>. Using EUH organizations can reduce their risk of cyber-attacks. Insurance companies use it to determine premiums and coverage levels, while businesses use it to make decisions about project investments and risk mitigation strategies <xref ref-type="bibr" rid="scirp.141700-31">
       [31]
      </xref>.</p>
     <p>Despite its widespread use, the Expected Utility Hypothesis has faced several criticisms <xref ref-type="bibr" rid="scirp.141700-31">
       [31]
      </xref>. One of the main critiques is its assumption of rationality, which does not always hold true in real-world scenarios <xref ref-type="bibr" rid="scirp.141700-31">
       [31]
      </xref>. Behavioral economists have documented numerous instances where individuals deviate from rational behavior due to biases, heuristics, and other psychological factors <xref ref-type="bibr" rid="scirp.141700-31">
       [31]
      </xref>.</p>
     <p>The Expected Utility Hypothesis remains a fundamental concept in understanding decision-making under uncertainty <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>. It is a tool that organizations can use to prioritize their cyber defenses when the number and types of cyber-attacks that they face are not clear. While it has its limitations, it provides a robust framework for analyzing choices and predicting behavior in various contexts <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>.</p>
     <p>There are some limitations that can be encountered while applying AI and EUH in cybersecurity defense prioritization. AI algorithms are only as good as the data they are trained on. Poor quality or biased data can lead to inaccurate detection and false positives <xref ref-type="bibr" rid="scirp.141700-32">
       [32]
      </xref>. AI systems can be vulnerable to adversarial attacks where malicious actors manipulate input data to deceive the AI, leading to incorrect threat assessments <xref ref-type="bibr" rid="scirp.141700-33">
       [33]
      </xref>.</p>
     <p>EUH relies on simplifying assumptions about rationality and preferences, which may not hold in the complex and dynamic landscape of cybersecurity <xref ref-type="bibr" rid="scirp.141700-33">
       [33]
      </xref>. Accurately estimating probabilities and outcomes of cyber threats can be challenging due to the unpredictability of attackers <xref ref-type="bibr" rid="scirp.141700-34">
       [34]
      </xref>.</p>
     <p>As research in behavioral economics continues to evolve, it is likely that new models and theories will further refine our understanding of utility and decision-making <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>.</p>
     <p>Expected Utility is calculated by multiplying the utility of each outcome by its probability and then summing these products for all possible outcomes <xref ref-type="bibr" rid="scirp.141700-8">
       [8]
      </xref>. The expected utility is then calculated by taking the weighted average of these utility values, with the weights being the probabilities of each outcome occurring <xref ref-type="bibr" rid="scirp.141700-30">
       [30]
      </xref>. A theoretical model of this process is displayed in the table below (See <xref ref-type="table" rid="table2">
       Table 2
      </xref>).</p>
     <table-wrap id="table2">
      <label>
       <xref ref-type="table" rid="table2">
        Table 2
       </xref></label>
      <caption>
       <title>
        <xref ref-type="bibr" rid="scirp.141700-"></xref>Table 2. Expected utility hypothesis theoretical model.</title>
      </caption>
      <table class="MsoTableGrid custom-table" border="0" cellspacing="0" cellpadding="0"> 
       <tr> 
        <td class="acenter" width="105.05%" colspan="11"><p style="text-align:center">Theoretical Model</p></td> 
       </tr> 
       <tr> 
        <td rowspan="2" class="acenter" width="24.00%" colspan="2"><p style="text-align:center"></p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="74.11%" colspan="8"><p style="text-align:center">Alternatives</p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="6.93%"><p style="text-align:center"></p></td> 
       </tr> 
       <tr> 
        <td class="custom-bottom-td custom-top-td acenter" width="18.85%" colspan="2"><p style="text-align:center">College (A)</p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="18.33%" colspan="2"><p style="text-align:center">College (B)</p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="18.50%" colspan="2"><p style="text-align:center">College (C)</p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="18.44%" colspan="2"><p style="text-align:center">College (D)</p></td> 
        <td class="custom-bottom-td custom-top-td acenter" width="6.93%"><p style="text-align:center">Total</p></td> 
       </tr> 
       <tr> 
        <td rowspan="5" class="custom-top-td acenter" width="9.28%"><p style="text-align:center">Utilities</p></td> 
        <td class="custom-top-td acenter" width="14.72%"><p style="text-align:center">Living Cost (1)</p></td> 
        <td class="custom-top-td acenter" width="9.44%"><p style="text-align:center">$300</p></td> 
        <td class="custom-top-td acenter" width="9.41%"><p style="text-align:center">2 = 1 × 2</p></td> 
        <td class="custom-top-td acenter" width="9.88%"><p style="text-align:center">$200</p></td> 
        <td class="custom-top-td acenter" width="8.44%"><p style="text-align:center">1 = 1 × 1</p></td> 
        <td class="custom-top-td acenter" width="9.10%"><p style="text-align:center">$400</p></td> 
        <td class="custom-top-td acenter" width="9.41%"><p style="text-align:center">3 = 1 × 3</p></td> 
        <td class="custom-top-td acenter" width="9.03%"><p style="text-align:center">$500</p></td> 
        <td class="custom-top-td acenter" width="9.41%"><p style="text-align:center">4 = 1 × 4</p></td> 
        <td class="custom-top-td acenter" width="6.93%"><p style="text-align:center">10</p></td> 
       </tr> 
       <tr> 
        <td class="acenter" width="14.72%"><p style="text-align:center">Dorms (2)</p></td> 
        <td class="acenter" width="9.44%"><p style="text-align:center">Good</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">4 = 2 × 2</p></td> 
        <td class="acenter" width="9.88%"><p style="text-align:center">Excellent</p></td> 
        <td class="acenter" width="8.44%"><p style="text-align:center">2 = 2 × 1</p></td> 
        <td class="acenter" width="9.10%"><p style="text-align:center">Average</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">6 = 2 × 3</p></td> 
        <td class="acenter" width="9.03%"><p style="text-align:center">Lacking</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">8 = 2 × 4</p></td> 
        <td class="acenter" width="6.93%"><p style="text-align:center">20</p></td> 
       </tr> 
       <tr> 
        <td class="acenter" width="14.72%"><p style="text-align:center">Tuition (3)</p></td> 
        <td class="acenter" width="9.44%"><p style="text-align:center">$500</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">12 = 3 × 4</p></td> 
        <td class="acenter" width="9.88%"><p style="text-align:center">$450</p></td> 
        <td class="acenter" width="8.44%"><p style="text-align:center">9 = 3 × 3</p></td> 
        <td class="acenter" width="9.10%"><p style="text-align:center">$400</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">6 = 3 × 2</p></td> 
        <td class="acenter" width="9.03%"><p style="text-align:center">$350</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">3 = 3 × 1</p></td> 
        <td class="acenter" width="6.93%"><p style="text-align:center">30</p></td> 
       </tr> 
       <tr> 
        <td class="acenter" width="14.72%"><p style="text-align:center">Class Size (4)</p></td> 
        <td class="acenter" width="9.44%"><p style="text-align:center">Medium</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">8 = 4 × 2</p></td> 
        <td class="acenter" width="9.88%"><p style="text-align:center">Small</p></td> 
        <td class="acenter" width="8.44%"><p style="text-align:center">4 = 4 × 1</p></td> 
        <td class="acenter" width="9.10%"><p style="text-align:center">Large</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">12 = 4 × 3</p></td> 
        <td class="acenter" width="9.03%"><p style="text-align:center">X-Large</p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">16 = 4 × 4</p></td> 
        <td class="acenter" width="6.93%"><p style="text-align:center">40</p></td> 
       </tr> 
       <tr> 
        <td class="acenter" width="14.72%"><p style="text-align:center">Total</p></td> 
        <td class="acenter" width="9.44%"><p style="text-align:center"></p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">26</p></td> 
        <td class="acenter" width="9.88%"><p style="text-align:center"></p></td> 
        <td class="acenter" width="8.44%"><p style="text-align:center">16</p></td> 
        <td class="acenter" width="9.10%"><p style="text-align:center"></p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">27</p></td> 
        <td class="acenter" width="9.03%"><p style="text-align:center"></p></td> 
        <td class="acenter" width="9.41%"><p style="text-align:center">40</p></td> 
        <td class="acenter" width="6.93%"><p style="text-align:center"></p></td> 
       </tr> 
      </table>
     </table-wrap>
     <p>Expected Utility Hypothesis answers questions about the dependence of a response variable on one or more predictors <xref ref-type="bibr" rid="scirp.141700-11">
       [11]
      </xref>. The question of reducing the dependent variable (security threats) is dependent on the independent variable (network security tools). These statistical concepts are illustrated by using a data set from published literature to assess a computed tomography– guided interventional technique <xref ref-type="bibr" rid="scirp.141700-12">
       [12]
      </xref>.</p>
     <p>The methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods also involve using the Likert Scale Model to create an ordinal ranking of the measures and threats (See <xref ref-type="table" rid="table3">
       Table 3
      </xref>).</p>
     <table-wrap id="table3">
      <label>
       <xref ref-type="table" rid="table3">
        Table 3
       </xref></label>
      <caption>
       <title>
        <xref ref-type="bibr" rid="scirp.141700-"></xref>Table 3. Security measures and threats ordinal ranking.</title>
      </caption>
      <table class="MsoTableGrid custom-table" border="0" cellspacing="0" cellpadding="0"> 
       <tr> 
        <td rowspan="3" class="acenter" colspan="2"><p style="text-align:center"></p></td> 
        <td class="custom-bottom-td acenter" colspan="10"><p style="text-align:center">Prioritization of 10 Cybersecurity Threats</p></td> 
        <td rowspan="1" class="acenter"><p style="text-align:center"></p></td> 
       </tr> 
       <tr> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">1</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">2</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">3</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">4</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">5</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">6</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">7</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">8</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">9</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">10</p></td> 
       </tr> 
       <tr> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Malware</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Phishing</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">(MitM)</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">DoS Attacks</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">SQLi</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Zero-DayExploits</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Insider Threats</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">APTs</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Credential Theft</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">IoT Vulnerable</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">Total Utility</p></td> 
       </tr> 
       <tr> 
        <td rowspan="10" class="custom-top-td acenter"><p style="text-align:center">Utilities</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">Software Updates</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">1</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">10</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">18</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">24</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">50</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">6</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">8</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">45</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">20</p></td> 
        <td class="custom-top-td acenter"><p style="text-align:center">292</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">User Training</p></td> 
        <td class="acenter"><p style="text-align:center">7</p></td> 
        <td class="acenter"><p style="text-align:center">2</p></td> 
        <td class="acenter"><p style="text-align:center">30</p></td> 
        <td class="acenter"><p style="text-align:center">40</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">42</p></td> 
        <td class="acenter"><p style="text-align:center">56</p></td> 
        <td class="acenter"><p style="text-align:center">64</p></td> 
        <td class="acenter"><p style="text-align:center">36</p></td> 
        <td class="acenter"><p style="text-align:center">100</p></td> 
        <td class="acenter"><p style="text-align:center">487</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">(MFA)</p></td> 
        <td class="acenter"><p style="text-align:center">4</p></td> 
        <td class="acenter"><p style="text-align:center">4</p></td> 
        <td class="acenter"><p style="text-align:center">9</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">32</p></td> 
        <td class="acenter"><p style="text-align:center">9</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">608</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">Network Segmentation</p></td> 
        <td class="acenter"><p style="text-align:center">3</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">21</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">24</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">16</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">30</p></td> 
        <td class="acenter"><p style="text-align:center">644</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">(IPS)</p></td> 
        <td class="acenter"><p style="text-align:center">8</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">24</p></td> 
        <td class="acenter"><p style="text-align:center">4</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">48</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">744</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">Password Policies</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">12</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">18</p></td> 
        <td class="acenter"><p style="text-align:center">10</p></td> 
        <td class="acenter"><p style="text-align:center">810</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">Least Privilege Principle</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">20</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">14</p></td> 
        <td class="acenter"><p style="text-align:center">14</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">818</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">Data Backup Plans</p></td> 
        <td class="acenter"><p style="text-align:center">9</p></td> 
        <td class="acenter"><p style="text-align:center">16</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">36</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">831</p></td> 
       </tr> 
       <tr> 
        <td class="acenter"><p style="text-align:center">Email Filtering</p></td> 
        <td class="acenter"><p style="text-align:center">5</p></td> 
        <td class="acenter"><p style="text-align:center">6</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">54</p></td> 
        <td class="acenter"><p style="text-align:center">110</p></td> 
        <td class="acenter"><p style="text-align:center">835</p></td> 
       </tr> 
       <tr> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">Web Filtering</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">5</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">8</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">54</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">110</p></td> 
        <td class="custom-bottom-td acenter"><p style="text-align:center">837</p></td> 
       </tr> 
       <tr> 
        <td class="custom-bottom-td custom-top-td acenter" colspan="2"><p style="text-align:center">Totals</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">262</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">388</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">652</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">764</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">950</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">780</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">950</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">684</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">656</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">820</p></td> 
        <td class="custom-bottom-td custom-top-td acenter"><p style="text-align:center">6906</p></td> 
       </tr> 
      </table>
     </table-wrap>
     <p>Note: A score of 110 means that the utility does not apply to the threat.</p>
    </sec>
   </sec>
   <sec id="s3">
    <title>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>3. Methodology</title>
    <sec id="s3_1">
     <title>3.1. Research Design</title>
     <p>This experimental survey research design was used to survey a simple random sample frame of 20 peer reviewed information security research articles. The selection criteria ensured that the articles included a diverse representation of different aspects of network security. Specifically, the articles had to mention various network security tools and procedures, highlighting their effectiveness in mitigating cyber threats. This approach allowed for a comprehensive analysis of current practices and trends in information security.</p>
     <p>The peer reviewed information security research articles were scanned for a list of ten network security tools and procedures. The ordinal ranking was done using a Likert scale instrument with a (1 - 10) prioritization of the tools and procedures listed most frequently in the peer reviewed articles. Below is a Flow chart of the Research Design.</p>
     <p>Step 1. Find 20 peer review articles that deal with the subject of cybersecurity</p>
     <p>Step 2. List those dependent variables (threats) and independent variables (tools and procedures designed to reduce those threats.</p>
     <p>Step 3. Using the Likert Scale, prioritize the variables according to how many times they were listed together in the articles.</p>
     <p>Step 4. Using expected utility analysis determines if there is a pattern of how often threats are listed with tools and procedures.</p>
    </sec>
    <sec id="s3_2">
     <title>
      <xref ref-type="bibr" rid="scirp.141700-"></xref>3.2. Data Analysis</title>
     <p>The data analysis was conducted using a Likert Scale, with a (1 - 10) prioritization of 10 network security tools and procedures and expected utility analysis to conduct a pair-wise comparison of each of the ten tools and procedures to their ability to reduce threats to network security. Decision-makers will understand the gaps between each alternative and the aspiration level <xref ref-type="bibr" rid="scirp.141700-16">
       [16]
      </xref>. Using expected utility hypothesis based on aspirations, the network security manager can see how one defense in depth security measure can cover a gap that another measure fails to cover. The research methods used in the study provided the advantage of using statistics to make inferences about larger groups, using very small samples, referred to as generalizability <xref ref-type="bibr" rid="scirp.141700-35">
       [35]
      </xref>. The findings are presented in the results section. The process used to analyze the data involved listing how often the independent variables were reported as reducing the dependent variables. This could imply a correlation between independent and dependent variables. The variables were then prioritized (ranked) and listed on an Expected Utility Hypothesis Scale to identify any possible correlations between the independent and dependent variables.</p>
    </sec>
   </sec>
   <sec id="s4">
    <title>4. Results</title>
    <p>The purpose of this chapter is to present the analysis which reject the H<sub>0 </sub>null hypothesis that expected utility analysis does not affect the relationship between the prioritization and combining of 20 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). Preferential independence can be described as the preferential outcome of one criterion over another that is not influenced by the remaining criteria <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Encryption can be seen in a network security expected utility analysis as the preferred security tool for preventing privacy loss.</p>
    <p>Data collected before the analysis in this experiment shows a lack of combining security measures and tools to combat specific security threats. The data capture (recording) and coding methodology employed in this study was used to determine the best defense in-depth choices from a list of decision alternatives (network security threats). Finally, a summary of the results is included in this chapter.</p>
   </sec>
   <sec id="s5">
    <title>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>5. Investigative Questions</title>
    <p>The study design included one investigative question which provided foundation for the main research questions. This section lists the investigative question and includes the statistical analysis to explore the question.</p>
    <sec id="s5_1">
     <title>Investigative Question 1</title>
     <p>Of the ten network security tools and procedures, prioritize them according to their prioritization from 20 Network Security Articles. Expected utility analysis was then used to array network threats to defense in depth measures. Network security issues, for example, malware, SQL injections and phishing attacks can be graphically displayed using expected utility diagrams.</p>
     <p>They can depict the key elements, including decisions, uncertainties, and objectives as nodes of various shapes and colors. The effects of using security tools such as antivirus and procedures such as pen testing can be shown in a utility fashion.</p>
    </sec>
   </sec>
   <sec id="s6">
    <title>6. Discussion</title>
    <p>The current agenda of prioritizing and combining defense in depth measures can continue to evolve based on this investigation. Defense in depth is an effective method of mitigation and prevention of automatic attacks that an organization faces from public internet <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Multi-factor Authentication can help to prevent Internet attacks password sniffing for example.</p>
    <p>Two types of countermeasures can significantly reduce the risk of such attacks: strong encryption and strong authentication of both devices and users <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. It is imperative that network security managers deploy strong encryption and authentication on their wireless network as a part of their defense in depth approach. Defense in depth takes a holistic approach to network security, protecting the network from several different perspectives with both tools and procedures.</p>
    <p>It is of importance to increase the secrecy capacity by exploiting sophisticated signal processing techniques, such as the artificial-noise-aided security <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. While working from home, communications must remain private to protect personal and organizational information. The new concept has decision makers setting an aspiration level, though it may not be reachable using current resources, or simply redesigning the decision space <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Defense in depth allows the security manager to be creative in security tool deployment so that he can successfully achieve his security goals.</p>
    <p>Secure communications should satisfy the requirements of authenticity, confidentiality, integrity, and availability (CIA) <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. The goal of defense in depth security is to protect CIA. Communications are also vulnerable to denial-of-service (DoS) attacks <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Firewalls and NIDS should also be included in the wireless network defense in depth deployment to prevent DOS attacks.</p>
   </sec>
   <sec id="s7">
    <title>7. Conclusions</title>
    <p>The research concluded that expected utility analysis can play a role in the organization’s decision process to array and combine defense in depth measures against network threats. If an eavesdropper lies in the transmit coverage area of the source node, the wireless communications session can be overheard by the eavesdropper <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Like how spies operate, eavesdroppers (sniffers) can easily intercept wireless communications. A combination of both security procedures and security tools plays an important role in defense in depth.</p>
    <p>An aspiration level could be attained by expanding employees’ competence set (e.g., training) or adding or changing new resources (e.g., through strategy alliance, innovation, or creativity) to expand the original decision space <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Both administrator and employee training are critical in achieving network security goals and objectives. To maintain confidential transmission, typically cryptographic techniques relying on secret keys are adopted to prevent eavesdropping attacks from intercepting the data transmission <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. To help meet social distancing requirements, encryption should be used to prevent intruders from tapping into private communications.</p>
    <p>Differing from the Internet, the smart grid has only two major directional information flows: bottom-up and top-down <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Because of the vertical nature of smart grid communications, redundant communication paths are required to enhance communications. Hackers collect data on different systems; the information collected is analyzed for possible security problems <xref ref-type="bibr" rid="scirp.141700-22">
      [22]
     </xref>. Stopping this reconnaissance is the first step in preventing an attack.</p>
    <p>Organizations can take several steps to reduce the risk of such unintentional DoS attacks <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Encryption and authentication are two of many measures that should be taken to prevent both intentional and unintentional DoS attacks. Building interrelationships (dependence and feedback) among criteria and improvement of criteria in general is used to achieve the aspiration level <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Deploying defense in depth analytically can help to build the synergy between security tools necessary to achieve organizational security goals.</p>
    <p>There are examples of detailed case studies that illustrate successful application of AI and expected utility hypothesis in cybersecurity prioritization in real-world organizational settings. A Fortune 500 international food chain with over 100,000 employees faced significant cybersecurity challenges <xref ref-type="bibr" rid="scirp.141700-36">
      [36]
     </xref>. Cyclops Security’s AI-powered Risk Prioritization platform helped the organization uncover critical risks by correlating and analyzing security data <xref ref-type="bibr" rid="scirp.141700-36">
      [36]
     </xref>.</p>
    <p>The platform identified several critical systems missing required protections and highlighted that two company executives with privileged access rights were accessing critical systems without using multi-factor authentication (MFA) <xref ref-type="bibr" rid="scirp.141700-37">
      [37]
     </xref>. A study compared the optimal resource allocation to cybersecurity and cyber insurance using Expected Utility Theory (EUT) and Prospect Theory (PT) <xref ref-type="bibr" rid="scirp.141700-37">
      [37]
     </xref>. The research demonstrated that EUT, which relies on rational decision-making principles, can help organizations optimize their resource allocation by assessing the probabilities and impacts of different threats <xref ref-type="bibr" rid="scirp.141700-37">
      [37]
     </xref>.</p>
    <p>Fructification of each layer of model presents vast variety of implementation alternatives and adoptability according to the design and architecture of organization <xref ref-type="bibr" rid="scirp.141700-7">
      [7]
     </xref>. Each organization will deploy a different variation of defense in depth. A malicious node in wireless networks can readily generate intentional interference for disrupting the data communications between legitimate users, which is referred to as a jamming attack (also known as DoS attack) <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. Innocent conversations, both business and pleasure can be interrupted by interference.</p>
    <p>The smart grid must have the ability to detect the attempt of an intruder to gain unauthorized access to computer systems <xref ref-type="bibr" rid="scirp.141700-15">
      [15]
     </xref>. Network intrusion detection systems can identify malware that has gained access to the smart grid. Insecure, poorly configured wireless access points can compromise confidentiality by allowing unauthorized access to the network <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Network administrators should be professionally trained on wireless network security when implementing wireless networks.</p>
    <p>The available published knowledge of expected utility analysis can be used to prioritize defense in depth measures against network threats. This is confirmed by the research conclusion.</p>
    <p>Defense in depth decision making can be deployed using EUH to enhance organizational IT security. To make the security policy effective, it must be practical and enforceable, and it must be possible to comply with the policy <xref ref-type="bibr" rid="scirp.141700-4">
      [4]
     </xref>. Organizations must develop effective network security plans. These plans should be strictly enforced.</p>
    <p>Defense in depth and expected utility analysis can be an important asset to the organization. Further advances can be gained in the use of defense in depth by continuing expected utility analysis. The decision space may be modified to achieve aspiration level of the objective space in changeable space situations <xref ref-type="bibr" rid="scirp.141700-16">
      [16]
     </xref>. The security of portable devices is changing the network security decision space, and defense in depth tools must adapt to meet those changes.</p>
    <p>To better understand the role that expected utility analysis can play in IT security this research proposed a expected utility analysis structural and measurement model of the relevant factors. The future of IT security should include additional exploratory models to advance understanding of why the current models are not substantially improving IT security. To understand the shortcoming of current IT security models, further exploratory studies should be conducted on additional models.</p>
   </sec>
   <sec id="s8">
    <title>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Acknowledgements</title>
    <p>I would like to thank the reviewers for their detailed comments that greatly improved the paper.</p>
   </sec>
   <sec id="s9">
    <title>Ethical Considerations</title>
    <p>The potential benefits of research in organizations, especially public safety organizations, can be greatly beneficial, but there are risks that some employees or the organization could be unfairly stigmatized. This study was conducted with the informed consent of all the participants.</p>
    <p>The participants were not subjected to risk. To avoid conflict of interest, the survey participants are in no way related to the researcher.</p>
   </sec>
   <sec id="s10">
    <title>Consent for Publication</title>
    <p>For specifically addressing an autonomous agency, the design included an informed consent process to ensure that participation was voluntary, with adequate information provided to participants to make their decision of whether or not to participate <xref ref-type="bibr" rid="scirp.141700-38">
      [38]
     </xref>. Specifically addressing diminished autonomy, while ensuring extra protection is afforded to prevent harm from exclusion.</p>
   </sec>
   <sec id="s11">
    <title>List of Abbreviations</title>
    <p>Advanced Persistent Threat (APT). “An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception)” <xref ref-type="bibr" rid="scirp.141700-39">
      [39]
     </xref>.</p>
    <p>Biometrics. “The measurement and analysis of unique physical or behavioral characteristics (such as fingerprint or voice patterns) especially as a means of verifying personal identity” <xref ref-type="bibr" rid="scirp.141700-40">
      [40]
     </xref>.</p>
    <p>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Botnets. “A botnet is a group of compromised computers under the control of an attacker” <xref ref-type="bibr" rid="scirp.141700-41">
      [41]
     </xref>.</p>
    <p>Defense in-depth. “Defense in-depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier” <xref ref-type="bibr" rid="scirp.141700-42">
      [42]
     </xref>.</p>
    <p>Denial of service (DOS). “A denial-of-service attack is an attempt by multiple attackers to make a service unavailable to its users” <xref ref-type="bibr" rid="scirp.141700-43">
      [43]
     </xref>.</p>
    <p>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Firewall. “A firewall is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules” <xref ref-type="bibr" rid="scirp.141700-43">
      [43]
     </xref>.</p>
    <p>Hash Algorithm (Hash). “An encryption algorithm set of rules by which information or messages are encoded so that unauthorized persons cannot read them” <xref ref-type="bibr" rid="scirp.141700-40">
      [40]
     </xref>.</p>
    <p>Intrusion detection system. Host intrusion detection systems and network intrusion detection systems are methods of security management for computers and networks <xref ref-type="bibr" rid="scirp.141700-44">
      [44]
     </xref>.</p>
    <p>Man-in-the-middle attack (MitM). “A kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users” <xref ref-type="bibr" rid="scirp.141700-45">
      [45]
     </xref>.</p>
    <p>Password. “A password is an un-spaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user” <xref ref-type="bibr" rid="scirp.141700-46">
      [46]
     </xref>.</p>
    <p>Public Key Infrastructure (PKI). “A cryptographic element that is the publicly shared half of an encryption code and that can be used only to encode messages” <xref ref-type="bibr" rid="scirp.141700-47">
      [47]
     </xref>.</p>
    <p>Phishing. “Phishing is the combined use of fraudulent e-mails and legitimate looking websites by cyber criminals to gain user credentials” <xref ref-type="bibr" rid="scirp.141700-41">
      [41]
     </xref>.</p>
    <p>
     <xref ref-type="bibr" rid="scirp.141700-"></xref>Social Engineering. “Social engineering refers to psychological manipulation of people into accomplishing goals that may or may not be in the target’s best interest. In cyber-attacks, it is often used for obtaining sensitive information or getting the target to take certain action (e.g. executing malware)” <xref ref-type="bibr" rid="scirp.141700-39">
      [39]
     </xref>.</p>
    <p>Spam. “Spam is the use of e-mail technology to flood mailboxes with unsolicited messages” <xref ref-type="bibr" rid="scirp.141700-41">
      [41]
     </xref>.</p>
    <p>SQL injection attacks. “These consist of attacks against web applications with the aim of extracting data or stealing credentials or taking control of the targeted web server” <xref ref-type="bibr" rid="scirp.141700-41">
      [41]
     </xref>.</p>
    <p>Watering Hole Attacks. “The concept of a watering hole attack is similar to a predator waiting at a watering hole in a desert, as the predator knows that the victims will have to come to the watering hole. Similarly, rather than actively sending malicious emails, the attackers can identify 3rd party websites that are frequently visited by the targeted persons and then try to infect one or more of these websites with malware” <xref ref-type="bibr" rid="scirp.141700-39">
      [39]
     </xref>.</p>
    <p>Worms/Trojans. “Worms and malicious programs have the ability to replicate and redistribute themselves by exploiting the vulnerabilities of their target systems” <xref ref-type="bibr" rid="scirp.141700-41">
      [41]
     </xref>.</p>
    <p>Zero-day Attacks. “Zero-day vulnerabilities, i.e., threats that use an error or a vulnerability in the application or the operating system and arise immediately after the vulnerability is found, but before the relevant upgrade is issued” <xref ref-type="bibr" rid="scirp.141700-48">
      [48]
     </xref>.</p>
   </sec>
  </sec>
 </body><back>
  <ref-list>
   <title>References</title>
   <ref id="scirp.141700-ref1">
    <label>1</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Microsoft Copilot. (2025) Expected Utility Hypothesis. Microsoft Copilot. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref2">
    <label>2</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Ewing, C. (2010) Engineering Defense-in-Depth Cybersecurity for the Modern Substation. Proceedings of the 12th Annual Western Power Delivery Automation Conference, Spokane, 13-15 April 2010, 1-5. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref3">
    <label>3</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Carey, M.J. and Paulsen, G.B. (2017) System and Method for Simulating Network Security Threats and Assessing Network Security. U.S. Patent Application No. 14/ 837,033. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref4">
    <label>4</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Fabro, M. (2006) Control Systems Cyber Security: Defense in Depth Strategies (No. INL/CON-07-12804). Idaho National Laboratory (INL). 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref5">
    <label>5</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Cleghorn, L. (2013) Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth. Journal of Information Security, 4, 144-149. &gt;https://doi.org/10.4236/jis.2013.43017
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref6">
    <label>6</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Mell, P.M., Shook, J. and Harang, R. (2017) Measuring and Improving the Effectiveness of Defense-in-Depth Postures. Proceedings of the 2nd Annual Industrial Control System Security Workshop. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref7">
    <label>7</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Rathore, S., Sharma, P.K., Loia, V., Jeong, Y. and Park, J.H. (2017) Social Network Security: Issues, Challenges, Threats, and Solutions. Information Sciences, 421, 43-69. &gt;https://doi.org/10.1016/j.ins.2017.08.063
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref8">
    <label>8</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Goztepe, K., Kilic, R. and Kayaalp, A. (2014) Cyber Defense in Depth: Designing Cyber Security Agency Organization for Turkey. Journal of Naval Science and Engineering, 10, 1-24. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref9">
    <label>9</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Schneier, B. (2006) Security in the Cloud. www.schneier.com/blog/archives/2006/02/security_in_the.html 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref10">
    <label>10</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Meier, K.J., Favero, N. and Zhu, L. (2015) Performance Gaps and Managerial Decisions: A Bayesian Decision Theory of Managerial Action. Journal of Public Administration Research and Theory, 25, 1221-1246. &gt;https://doi.org/10.1093/jopart/muu054
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref11">
    <label>11</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Weisberg, S. (2005). Applied Linear Regression (Vol. 528). John Wiley&amp;Sons. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref12">
    <label>12</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Bernoulli, D. (1738) Specimen theoriae novae de mensura sortis. Commentarii Academiae Scientiarum Imperialis Petropolitanae, 5, 175-192. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref13">
    <label>13</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Haddawy, P. (1999) An Overview of Some Recent Developments in Bayesian Problem-Solving Techniques. AI Magazine, 20, 11-19. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref14">
    <label>14</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     El-Khameesy, N. and Mohamed, H.A.R. (2013) A Proposed Model for Datacenter in-Depth Defense to Enhance Continual Security. International Journal of Information Technology and Computer Science, 5, 55-67. &gt;https://doi.org/10.5815/ijitcs.2013.04.07
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref15">
    <label>15</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Zou, K.H., Tuncali, K. and Silverman, S.G. (2003) Correlation and Simple Linear Regression. Radiology, 227, 617-628. &gt;https://doi.org/10.1148/radiol.2273011499
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref16">
    <label>16</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Zou, Y., Zhu, J., Wang, X. and Hanzo, L. (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proceedings of the IEEE, 104, 1727-1765. &gt;https://doi.org/10.1109/jproc.2016.2558521
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref17">
    <label>17</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Nilsson, D.K. and Larson, U.E. (2009) A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure. Journal of Networks, 4, 552-564. &gt;https://doi.org/10.4304/jnw.4.7.552-564
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref18">
    <label>18</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Bass, T. and Robichaux, R. (n.d.). Defense-in-depth Revisited: Qualitative Risk Analysis Methodology for Complex Network-Centric Operations. 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), 1, 64-70. &gt;https://doi.org/10.1109/milcom.2001.985765
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref19">
    <label>19</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     IBM. (2023) Spear Phishing vs. Phishing: What’s the Difference? &gt;https://www.ibm.com/think/topics/spear-phishing-vs-standard-phishing 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref20">
    <label>20</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     CrowdStrike. (2022) What’s the Difference between Spear Phishing vs. Phishing? &gt;https://www.crowdstrike.com/en-us/cybersecurity-101/social-engineering/spear-phishing-vs-phishing/ 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref21">
    <label>21</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Liu, M.X., Zhang, Q.Y., Zhao, H. and Yu, D.M. (2008) Network Security Situation Assessment Based on Data Fusion. First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008), Adelaide, 23-24 January 2008, 542-545. &gt;https://doi.org/10.1109/wkdd.2008.35 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref22">
    <label>22</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Conti, G. and Abdullah, K. (2004) Passive Visual Fingerprinting of Network Attack Tools. Proceedings of the 2004 ACM workshop on Visualization and Data Mining for Computer Security, New York, 45-54. &gt;https://doi.org/10.1145/1029208.1029216
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref23">
    <label>23</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Microsoft (2025) Responsible AI Validation Checks for Declarative Agents. &gt;https://learn.microsoft.com/en-us/microsoft-365-copilot/extensibility/rai-validation 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref24">
    <label>24</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Stryker, C. (2024) What Is Artificial Intelligence (AI). IBM. &gt;https://www.ibm.com/topics/artificial-intelligence 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref25">
    <label>25</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Fortinet: Fortinet. AI in Cybersecurity: Key Benefits, Defense Strategies,&amp;Future Trends. &gt;https://www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecurity 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref26">
    <label>26</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Forbes: Vellante, D. (2025) The State of AI Cybersecurity in 2025 and beyond. &gt;https://www.forbes.com/sites/danielvellante/2025/02/10/the-state-of-ai-cybersecurity-in-2025-and-beyond/ 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref27">
    <label>27</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     CrowdStrike (2025) 2025 Global Threat Report. CrowdStrike, Inc. &gt;https://www.crowdstrike.com/en-us/global-threat-report/ 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref28">
    <label>28</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Chen, J. (2021) Expected Utility: Definition, Calculation and Examples. Investopedia Expected Utility: Definition, Calculation, and Examples. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref29">
    <label>29</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Microsoft (2025) Security Copilot Use Cases for Security and IT Roles. &gt;https://learn.microsoft.com/en-us/copilot/security/use-case-role-overview 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref30">
    <label>30</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Von Neumann, J. and Morgenstern, O. (1944) Theory of Games and Economic Behavior. Princeton University Press.
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref31">
    <label>31</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Sharpe, W.F. (1964) Capital Asset Prices: A Theory of Market Equilibrium under Conditions of Risk. The Journal of Finance, 19, 425-442. &gt;https://doi.org/10.1111/j.1540-6261.1964.tb02865.x
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref32">
    <label>32</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     ThreatLocker (2024). Dangers of AI in Cybersecurity You Need to Know about. &gt;https://www.threatlocker.com/blog/dangers-ai-cybersecurity 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref33">
    <label>33</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Palo Alto Networks (n.d.) What Are the Risks and Benefits of Artificial Intelligence (AI) in Cybersecurity? &gt;https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref34">
    <label>34</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     National Institute of Standards and Technology (2025) Using Enterprise Risk Management (ERM) and the NIST Cybersecurity Framework (CSF) for Cybersecurity Risk Management (NIST IR 8286B). &gt;https://csrc.nist.gov/pubs/ir/8286/b/upd1/final 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref35">
    <label>35</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Cooper, C.R. and Schindler, P.S. (2008) Business Research Methods. 10th Edition, McGraw-Hill. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref36">
    <label>36</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Cyclops Security (2025) Case Study: Uncovering Risk. &gt;https://blog.cyclops.security/case-study-uncovering-risk 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref37">
    <label>37</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     ArXiv (2025) Optimal Resource Allocation to Cybersecurity and Cyber Insurance: A Comparative Analysis Using EUT and PT. &gt;https://arxiv.org/abs/2411.18838 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref38">
    <label>38</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     National Commission for the Protection of Human Subjects (1979) Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research. Department of Health and Welfare. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref39">
    <label>39</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Chen, P., Desmet, L. and Huygens, C. (2014) A Study on Advanced Persistent Threats. In: De Decker, B. and Zúquete, A., Eds., Communications and Multimedia Security. CMS 2014. Lecture Notes in Computer Science, Vol. 8735, Springer, 63-72. &gt;https://doi.org/10.1007/978-3-662-44885-4_5
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref40">
    <label>40</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Dictionary, Merriam-Webster (2015) An Encyclopedia Britannica Company. &gt;http://www.merriam-webster.com/dictionary 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref41">
    <label>41</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Singh, A. and Bora, M.S. (2013) Cyber Threats and Security for Wireless Devices. Journal of Environmental Science, Computer Science, and Engineering&amp;Technology, 2, 595-601. 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref42">
    <label>42</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Rouse, M. (2007) Defense in Depth. &gt;https://www.techtarget.com/searchsecurity/definition/defense-in-depth 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref43">
    <label>43</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Cobb, M. (2014) Firewall. &gt;http://searchsecurity.techtarget.com/definition/firewall 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref44">
    <label>44</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Cole, B. (2014) What Is an Intrusion Detection System (IDS)? &gt;http://searchcompliance.techtarget.com/definition/intrusion-detection-systems-IDS 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref45">
    <label>45</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Mallik, A., Ahsan, A., Shahadat, M. and Tsou, J. (2019) Man-in-the-Middle-Attack: Understanding in Simple Words. International Journal of Data and Network Science, 3, 77-92. &gt;https://doi.org/10.5267/j.ijdns.2019.1.001
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref46">
    <label>46</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Merriam-Webster (2020) Password. Merriam-Webster.com Dictionary. &gt;https://www.merriam-webster.com/dictionary/password 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref47">
    <label>47</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Merriam-Webster. (2020) Public-Key. In Merriam-Webster.com Dictionary. &gt;https://www.merriam-webster.com/dictionary/public-key 
    </mixed-citation>
   </ref>
   <ref id="scirp.141700-ref48">
    <label>48</label>
    <mixed-citation publication-type="other" xlink:type="simple">
     Pavlyushchik, M.A. (2014) System and Method for Detecting Malicious Code Executed by Virtual Machine. U.S. Patent No. 8,713,631.
    </mixed-citation>
   </ref>
  </ref-list>
 </back>
</article>