1 Introduction
Cyber-security is a concern for any organization using a large number of IT devices or with a large number of IT-related assets. It is challenging for an organization to determine its cyber-risk and its resilience to cyber-attacks. To mitigate the risk, an organization can implement a cyber-security plan (or portfolio), where a plan consists of a set of security controls. Unfortunately there is a large number of permutations and combinations by which an attacker can use to exploit the organization networks [1].