As shown in Fig attackers can

The two breach probability functions indicate that Ezatiostat the breach probability and the threat probability is linear, given a reasonable assumption that threat probability is outside of the firms’ control. However, the breach probability shows quite different characteristics with respect to the intrinsic vulnerability and the security investment. The breach probability is more convex in an opportunistic attack than in a targeted attack with respect to the intrinsic vulnerability. This relationship indicates that the breach probability of an opportunistic attack increases more slowly than that of a target attack when the intrinsic vulnerability is small, but once the intrinsic vulnerability crosses a certain threshold, the breach probability of an opportunistic attack increases more rapidly than that of a target attack. The breach probability is also more convex in an opportunistic attack than in a targeted attack with respect to the security investment. This relationship indicates that an initial investment more significantly affects opportunistic attacks. Furthermore, cones also explains why opportunistic attacks can be more easily addressed than targeted attacks.