Exploring Information Asymmetry in Two-Stage Security Games