Interdependent Risk Networks and Role of Cyber Insurance

Slides:



Advertisements
Similar presentations
1 Cyber Insurance and IT Security Investment: Impact of Interdependent Risk Hulisi Ogut, UT-Dallas Srinivasan Raghunathan, UT-Dallas Nirup Menon, UT-Dallas.
Advertisements

Economic Incentives to Increase Security in the Internet: the Case for Insurance Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) IEEE INFOCOM, Rio 2009.
Geoffrey Heal Graduate School of Business Columbia University Howard Kunreuther Center for Risk Management.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Introduction to Derivatives and Risk Management Corporate Finance Dr. A. DeMaskey.
Introducing Computer and Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Estimating the Cost and Benefits of Software Assurance Investments Thomas P. Frazier November 9, 2006.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Risk Management Vs Risk avoidance William Gillette.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Chapter 11: Project Risk Management
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
David N. Wozei Systems Administrator, IT Auditor.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
Chapter 2 Insurance and Risk
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Topic 5: Basic Security.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Project Risk Management Planning Stage
1 Chapter 23 Risk Management. 2 Topics in Chapter Risk management and stock value maximization. Fundamentals of risk management.
Computer Security By Duncan Hall.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Cyber Liability Insurance for an unsecure world
Information Systems Security
Chapter 2 Insurance and Risk
CS457 Introduction to Information Security Systems
Securing Information Systems
Technology and Business Continuity
Securing Network Servers
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Risk Management 101.
CMSC 345 Defensive Programming Practices from Software Engineering 6th Edition by Ian Sommerville.
Chapter 8 – Administering Security
Insiders are Today’s Biggest Security Threat
Unit 32 – Networked Systems Security
Evaluating Existing Systems
Chapter 1: Introduction
Evaluating Existing Systems
Lecture 14: Business Information Systems - ICT Security
Introduction to Risk Management
Trends in my profession, Information Technology
Understand Core Security Principles
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
I have many checklists: how do I get started with cyber security?
Cyber Issues Facing Medical Practice Managers
Internet Interconnection
The Importance of Project Risk Management
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Lecture 20 Insurance Companies.
ONLINE SECURE DATA SERVICE
Strategic threat assessment
Computer Security By: Muhammed Anwar.
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Presentation transcript:

Interdependent Risk Networks and Role of Cyber Insurance Chandra Bhatt, Himani Gulati, Sanaz Hosseinzadeh, Panati Sree Sai Lekha, Aman Sharma, Richard Whitehouse

Overview Cyber Attacks and Security Mechanisms Role of Cyber Insurance Our Proposal Richard

Cyber insurance helps hedge against residual risks Introduction Cyber insurance helps hedge against residual risks  Because internet and computer-based systems today communicate more and more with one another, mostly as anonymous partners, they are increasingly vulnerable to attack Security mechanisms such as antivirus software and firewalls can mitigate attacks However, these tools do not fully mitigate losses Network value increases as the number of users increases Actors’ level of risk of becoming a victim of a cyber attack is interdependent Richard

Breakdown of the Problem Some parties invest in protection against cyber attacks at the cost of time or money This action reduces their risk Public benefit: other parties in the network experience reduced risk These actions represent the creation of a positive externality Richard Nash Equilibrium: The point where parties acting in self-interest make no addition gains from deviating in their strategy

The Model The general model has three classes of a Interdependent Security (IDS) problem. Cyber attack risk is a first- or second-class IDS problem In a first-class problem, risk cannot be completely eliminated via investment in security Indirect Residual risk remains due to the behavior of others In a second-class problem, risk can be completely eliminated via an in investment in security No risk remains due to the behavior of other actors In third-class of IDS problem, positive interdependencies arise Himani to

A Scenario Economic ecosystem: many organizations use the internet, and, therefore exposed to cyber risk In this scenario, all organizations benefit from using the internet (utility u) This is reduced to u < u in the case of a cyber attack Assume that there is some technology that can eliminate the risk of an attack Each firm must decide whether to invest in such a technology

Once a firm is infected by malicious software, other organizations may also be impacted because they may get the virus via their connectivity with that organization Let the probability of a cyber attack be q(x), where x denotes the proportion of organizations without protection in the internet community x satisfies 0 ≤ x ≤ 1 Community security: more actors without protection, the greater the risk for all If no firm invests in protection, then the maximum risk of an attack in the community will generally be smaller than one. However, the risk of cyber attack is reduced to zero if every firm invests in protection

Interpretation If no investment in protection: Risk of attach is high Protective measures reduce expected cost due to losses Cost of investment is minimal comparatively If all invest in protection: Risk of attack is zero, Investment in protection is costly Himani

Policy Implications Fundamentally, the cost of cyber risks is too great for a single firm Regulation Risk of mandating protection Firms could bear too high of a cost Subsidies Intervene to assist firms manage outsized risks Government reinsurance Current environment Richard

Role of Cyber Insurance

Risk Management and Cyber Insurance Evaluate threats and vulnerabilities associated with information systems Understand the risk: probability of the threat and its magnitude Threat management strategies: Accept Avoid Mitigate Transfer No amount of technology will ever completely eradicate risk Solution: Feasibly secure data and infrastructure and invest in cyber insurance to cover the unexpected and intangible items that cannot be insured Himani

What is Cyber Insurance? Cyber insurance transfers the risk associated with the loss of data to a insurance provider in exchange for a premium Cyber insurance covers a number of areas that are often not available in traditional business policies and insurance Traditional policies do not cover: Denial-of-service attacks Damage caused by hackers Malicious insiders Worms and viruses Electronic theft of confidential information Cyber insurance covers losses from these breaches as well as Intellectual property and content infringement cases and electronic errors and omissions Himani

Cyber Insurance Challenges While there are benefits to cyber insurance, insurers face the following challenges when issuing cyber insurance policies: Underwriting: The process by which insurers evaluate a firm’s risk Pricing: The premium set for an insurance policy after underwriting Adverse selection: Those with higher risks tend to buy insurance Moral Hazard: No incentive to act in a manner that mitigates risk For example, a firm adopts lax security standards after purchasing cyber insurance Correlation: Interrelated cyber risks Example: Entire industry relies on the same software that has a zero-day vulnerability [R.] Cyber Insurance: A Risk Management Tool? By Alison Hedrick Richard

Proposed Solution

We propose an application model that will use an incremental database to detect possible cyber threats on any software network/framework This application model generates a matrix which provides a quantitative measure of vulnerabilities of cyberattacks on the clients’ systems

Incremental Database Incremental refers to the database which has the ability to grow with time We propose seeding using a database similar to the Global Risk Database, a proprietary database provided through the SAS Institute’s SAS OpRisk Var product Schema for our database is created by assuming threats to be chunks of code. Hence the schema should have  Name of the threat, The vulnerable components, Severity of the threat,  and the actual code chunk  

Database Efficiency Yes, our Database is efficient because We are going to store data in normalized form to improve data retrieval process efficiency. Since it is incremental, it keeps track of the changes done in the files and runs an update for only those files, hence effective. No loss, full backups of the database will be scheduled at regular intervals.

Application Model The application model uses any recursive methodology and simulates each cyber threat from the database one by one on a network or system to gauge how prepared a client may be, and where weaknesses reside It rates the threat to prioritize and address the most significant threat first. These threats present the biggest risk The rating process weighs the probability of the threat against the damage that could result should an attack occur

Performance No exploitation of clients’ data - It aims to detect system wide threats and hence eliminates the need for the insurance company to know internal functionality of the system 0% chances of data leak - application would use dummy data for determining vulnerabilities instead of real time data Flexible - The main components of our application model of database, framework and output, are loosely coupled and hence future change adaptable Scalable – Application model is independent of total input or output. Its performance will not be impacted if load increases Cost - Initial installation cost can be a bit high for this application model but it will not add any huge amount to the insurance companies since they already involve third parties to do the testing on their behalf

Cyber Threat Matrix Encapsulate behavioral characteristics of a complex client system to cyber threats Characterize the type of threat based on its overall nature against the host system  Divided into levels of magnitude, with each level signifying susceptibility of a client's system to a cyber threat

Importance of the Matrix This threat matrix will serve as a model for insurance provider to help in pricing of insurance policies This will show exactly what are the risks or vulnerabilities in system, and also  their percentage of susceptibility This will help companies seeking insurance to decide what are the risks that company should get coverage for and hence avoid investing for the threats with a low susceptibility percentage

Future Enhancements and Business Implications As the chances of successful cyber-attack on the client increases, the chances of insurance company paying a large claim also increases. Consequently, too high of a risk percentage would translate to the insurance company not wanting to cover for it at any level of premium.  Hence client would need to make the decision to move to some other insurance company which would provide coverage despite the high risk However, should this solution be widely adopted, changing insurance providers would have no material impact on the issuance of the policy Overall, represents an improvement over current underwriting practices More optimal pricing of premiums Collection of data: Cannot prevent correlation but can model it