A novel cybersecurity model is proposed to accommodate the dependence among attack outcomes. The monotonicity and bounds of the compromise probability are studied. The dependence effect on the compromise probability and attack cost is discussed via simulation. The optimal strategy that leads to maximum compromise probability or minimum attack cost is presented.