Anatomy of threat landscape and security games