The Economics of Cyber Security

Slides:



Advertisements
Similar presentations
Inventorying Products and Supplies. Next Generation Science / Common Core Standards Addressed! CCSS. ELA RST.11 ‐ 12.2 Literacy Determine the central.
Advertisements

© John Wiley & Sons, 2005 Chapter 9: Joint Product and By-Product Costing Eldenburg & Wolcott’s Cost Management, 1eSlide # 1 Cost Management Measuring,
Economic Systems SSEF4.
Personal SWOT Analysis ICEL - UNIT I1. What is SWOT 1960’s and 70’s - Albert Humphrey - developed this strategic planning tool using data from the top.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
 The Indispensable Component of Cyber Security: The Dynamics of an Effective Cyber Cooperation Prof. Nazife Baykal Director of METU Informatics Institute.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Retail Buying Chapter Ten Core Concepts in Fashion by Laura Portolese Dias.
“The Interview” Strategic Analysis Carl Budenski, Ben Cole, Matt Horas, Michael Peterson.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Managing Portfolio for Individual Investors Jakub Karnowski, CFA Portfolio Management for Financial Advisers.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Security Mindset Lesson Introduction Why is cyber security important?
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
FM – 4.00 Understand the marketing of fashion 4.01 Understand the fashion retail elements of marketing.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Core Concepts in Fashion Chapter Ten.
Principles of Politics Chapter 1. What Is Government and Why Is It Necessary? ► Government: formal institutions and procedures through which a land and.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Argumentative Essay Thesis. The thesis statement or main claim must be debatable An argumentative or persuasive piece of writing must begin with a debatable.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
C hap t er 1: Why Study IR? Lecturer: Som Savuth MPS and B.Ed. h.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
What is Cyber Security Cyber War Cyber Power?
The Process of Merchandise Planning
Chapter 1: Foundations of Government
Managing Strategic Credit and Collection in the Industrial Environment
The Global Marketplace
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Make it Operational: Food Sales
Cyber Aggression and Conflict
COMP3357 Managing Cyber Risk
D39BU – Business Management in the Built Environment
Foreign Policy.
Consumer Economics Chapter 3 Consumer Theories and Models
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
The thesis statement or main claim must be debatable!
Global Cyber Insurance Market By Manufacturers, Countries, Type And Application, Forecast To 2022 Publish Date : 04-Dec-2017 No of Pages : 116 Single User.
The EUROPEAN UNION’S BUDGET
CZECH – GERMAN YOUNG PROFESSIONAL PROGRAM
Managing Information Technology
Chapter 17 Political Parties
CSI Survey 2007 Tiffany Gorman
The Sustainable and Resilient
The Global Marketplace
Frameworks for Valuation
Network Security Best Practices
Introduction to Business
Building Changes’ Strategic Business Planning Process
Theories of Punishment
Mean-Variance Portfolio Rebalancing with Transaction Costs
Inventory Chapter 8 Why is accounting for inventory so important?
Cybersecurity Am I concerned?
Pepperfry – Becoming profitable within the next 18 months
Protecting Your Company’s Most Valuable Asset
Prepared by: Yazan Metwalli(148371) Moyad Habiballah(137535)
Preventing Information Technology Crimes
Urban Security in the 21st Century
Security Theory And Peak Oil Theory.
Economic impact of cruising on emerging markets & the home port debate
The Global Marketplace
Assessing organised crime: threat, anticipation and future
Chapter 1 Notes.
A Secret Service Perspective on Credit Card Fraud
Chapter 12: The Design of the Tax System
Presentation transcript:

The Economics of Cyber Security Brandon Valeriano Cardiff University  

The Perspective of the Cyber Moderate The cyber security field has been divided into what is of thought of as two camps on the future of cyber conflict debate: the cyber prognosticators and the cyber skeptics. We assert that there can be a middle point of view, what can be framed as cyber moderation. “cyber conflict will occur but the conflicts themselves will be trivial, will rarely result in a change in behavior in the target, and will largely be regional cyber incidents connected to traditional international issues at stake between states. This leads us to question the direction of the future uses of the tactic” Is there evidence of a new of way cyber crime? What does the economic of cyber security really change?

Cyber Crime Cyber crime would be leveraging of digital technologies for criminal intent. Not diplomatic or strategic, but either chaos or financially motivated activities.

Cyber Crime

Cyber Crime

Cyber shrinkage applied to Cyber Crime A theory of cyber shrinkage would be based on the traditional concept of shrinkage given a liberal market economy. One to two percent is an acceptable loss according to volume given a certain context founded on operating at a large volume. Without putting crime in the proper context, securitizing cyberspace could be the result. Citizens are limited to their online activities due to an artificial yet popular fear where governments pass laws based on a few popularized incidents such as the Sony hack.

Data Analysis Four high profile data breaches on retailers in the last few years: Target, Home Depot, EBay, and Neiman Marcus. We look at total revenues and online revenues, and then calculate net losses for the high-profile data breach and divide these losses by the total online revenues to see if there is evidence for cyber shrinkage. For the most part, online sales are only a small fraction of these retailers’ revenues Yet even in the face of being compromised by hackers; these companies continue to move more and more inventory online.

Data Analysis

Analysis Regardless of the data breaches of the four cases presented above, all four large retailers are putting more and more of their inventory online. It seems online sales are the future for these retailers, regardless of the treat from cyber crime. This implies that the gains to be had from online sales still outweigh the losses. Even Target is moving forward with expanding their online inventory

Discussion Assuming we accept a certain amount of cyber shrinkage, how to do we minimize these losses? Sensitive information should be behind lock and key not accessible through regular channels. To allow for more access would leave the producer of this information at risk. Only by accepting risk and minimizing the damage done by control merchandise (information), can we move towards a feasible view of cyber security.

Conclusions Once we move to this frame we can be begin to have a realistic debate about the dangers in the cyber realm. With this step, we think that prognostications of cyber doom and threat are toothless. There needs to be a recognizing at home, with defense the first step. Rather than moving first to blame the attack, look at the defense framework and why the attacker chooses a certain target. Cyber interactions at not all that different than past physical interactions. Once we accept this reality we can move towards a nuanced view of cyber security.

The Cyber Future Militarizing digital space leaves little room for civilian applications such as research, communication, education, and productivity Given that we are in an era of cyber stability and peace, how do we encourage it to endure? The simplest way is to maintain that attacks by states and non-state actors alike on civilian populations are off limits. Going further, institutions need to be built that might enforce these norms of non-action and cyber protection Cyberspace can be controlled and made safe, but this requires us to understand it, to be aware of the possible escalation dynamics at hand in each conflict, and to be take in all the information possible - not just relying on one source or perspective.