Asymmetric information games and cyber security