Resource Allocation in Cybersecurity