Allocating Resources to the Search for Vulnerabilities In Information Infrastructures