5.1 HISTORICAL PERSPECTIVE TO GAME THEORY’S ORIGINS5.2 APPLICATIONS OF GAME THEORY TO CYBER-SECURITY RISK5.3 INTUITIVE BACKGROUND: CONCEPTS, DEFINITIONS, AND NOMENCLATURE5.4 RANDOM SELECTION FOR NASH MIXED STRATEGY5.5 ADVERSARIAL RISK ANALYSIS MODELS BY BANKS, RIOS, AND RIOS5.6 AN ALTERNATIVE MODEL: SAHINOGLU’S SECURITY METER FOR NEUMANN AND NASH MIXED STRATEGY5.7 OTHER INTERDISCIPLINARY APPLICATIONS OF RISK METERS5.8 MIXED STRATEGY FOR RISK ASSESSMENT AND MANAGEMENT- UNIVERSITY SERVER AND SOCIAL NETWORK EXAMPLES5.9 APPLICATION TO HOSPITAL HEALTHCARE SERVICE RISK5.10 APPLICATION TO ENVIRONMETRICS AND ECOLOGY RISK5.11 APPLICATION TO DIGITAL FORENSICS SECURITY RISK5.12 APPLICATION TO BUSINESS CONTRACTING RISK5.13 APPLICATION TO NATIONAL CYBERSECURITY RISK5.14 APPLICATION TO AIRPORT SERVICE QUALITY RISK5.15 APPLICATION TO OFFSHORE OIL-DRILLING SPILL AND SECURITY RISK5.16 DISCUSSIONS AND CONCLUSION5.17 EXERCISESREFERENCES