Strategies Without Frontiers - Game Theory in Security
Offered By: YouTube
Course Description
Overview
Explore game theory concepts and their applications in cybersecurity through this comprehensive conference talk from BSidesLV 2014. Delve into various game types, including Prisoner's Dilemma, Matching Pennies, and Hawk/Dove, while examining strategies, equilibrium, and mind games. Investigate Eric Berne's transactional analysis games, the Badger Game, and trolling techniques. Learn about iterated games, their properties, and societal implications. Gain insights into signaling, peacekeeping, and the role of evolution in game theory. Discover how these strategies can be applied to real-world scenarios in information security and beyond.
Syllabus
Intro
MOTIVATION
OUTLINE
WHAT'S IN A GAME?
A NORMAL FORM GAME
STRATEGIES
PRISONER'S DILEMMA
MATCHING PENNIES
DEADLOCK
STAG HUNT
CHICKEN
HAWK/DOVE
BATTLE OF THE SEXES
WHAT HAVE WE SEEN SO FAR?
EQUILIBRIUM
MIND GAMES
TYPES OF INTERACTIONS
BERNE'S GAMES: STRUCTURE
BERNE'S GAMES: EXAMPLES
THE BADGER GAME
TROLLING
THE SETUP
BOTH SPLIT
ONE SPLITS, ONE STEALS
OBSERVATION
SIGNALING
THE COMPLETE PATH
ITERATED GAMES
PROPERTIES
SOCIETAL ITERATED GAME THEORY
EVOLUTION IS A HARSH MISTRESS
PEACEKEEPING
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network