Text this: Analysis of cyberspace security based on game theory