Cyber Insurance

09/30/2018
by   Quanyan Zhu, et al.
0

This chapter will first present a principal-agent game-theoretic model to capture the interactions between one insurer and one user. The insurer is deemed as the principal who does not have incomplete information about user's security policies. The user, which refers to the infrastructure operator or the customer, implements his local protection and pays a premium to the insurer. The insurer designs an incentive compatible insurance mechanism that includes the premium and the coverage policy, while the user determines whether to participate in the insurance and his effort to defend against attacks. The chapter will also focus on an attack-aware cyber insurance model by introducing the adversarial behaviors into the framework. The behavior of an attacker determines the type of cyber threats, e.g. denial of service (DoS) attacks, data breaches, phishing and spoofing. The distinction of threat types plays a role in determining the type of losses and the coverage policies. The data breaches can lead to not only financial losses but also damage of the reputations. The coverage may only cover certain agreed percentage of the financial losses.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/03/2018

Optimal Cyber Insurance Policy Design for Dynamic Risk Management and Mitigation

Recently, with the growing number of cyber-attacks and the constant lack...
research
11/22/2019

FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

Internet of Things (IoT) is highly vulnerable to emerging Advanced Persi...
research
09/06/2018

Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception

Security challenges accompany the efficiency. The pervasive integration ...
research
10/26/2022

On the Role of Risk Perceptions in Cyber Insurance Contracts

Risk perceptions are essential in cyber insurance contracts. With the re...
research
10/13/2018

Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System

Cyber-security is an important societal concern. Cyber-attacks have incr...
research
05/03/2019

Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

Lateral movement attacks are a serious threat to enterprise security. In...

Please sign up or login with your details

Forgot password? Click here to reset