1. The document proposes using a simple game of hide-and-seek to abstractly model cybersecurity problems.
2. It explores strategies for hiders and seekers in this game, finding that hiders can favor some locations significantly before their behavior becomes exploitable. It also finds little benefit to seekers conducting a partial search based on probability information.
3. Further work is suggested to model more complex hider and seeker behaviors, topologies, and the ability of agents to change strategies dynamically.