scispace - formally typeset
Journal ArticleDOI

Will Catastrophic Cyber-Risk Aggregation Thrive in the IoT Age? A Cautionary Economics Tale for (Re-)Insurers and Likes

TLDR
In this paper, a game-theoretic analysis was conducted to investigate whether an ecosystem comprising a set of profit-minded cyber-insurance companies, each capable of providing reinsurance services for a service-networked IT environment, is economically feasible to cover aggregate cyber-losses arising due to a cyber-attack.
Abstract
Service liability interconnections among networked IT and IoT-driven service organizations create potential channels for cascading service disruptions due to modern cybercrimes such as DDoS, APT, and ransomware attacks. These attacks are known to inflict cascading catastrophic service disruptions worth billions of dollars across organizations and critical infrastructure around the globe. Cyber-insurance is a risk management mechanism that is gaining increasing industry popularity to cover client (organization) risks after a cyber-attack. However, there is a certain likelihood that the nature of a successful attack is of such magnitude that an organizational client’s insurance provider is not able to cover the multi-party aggregate losses incurred upon itself by its clients and their descendants in the supply chain, thereby needing to re-insure itself via other cyber-insurance firms. To this end, one question worth investigating in the first place is whether an ecosystem comprising a set of profit-minded cyber-insurance companies, each capable of providing re-insurance services for a service-networked IT environment, is economically feasible to cover the aggregate cyber-losses arising due to a cyber-attack. Our study focuses on an empirically interesting case of extreme heavy tailed cyber-risk distributions that might be presenting themselves to cyber-insurance firms in the modern Internet age in the form of catastrophic service disruptions, and could be a possible standard risk distribution to deal with in the near IoT age. Surprisingly, as a negative result for society in the event of such catastrophes, we prove via a game-theoretic analysis that it may not be economically incentive compatible, even under i.i.d. statistical conditions on catastrophic cyber-risk distributions, for limited liability-taking risk-averse cyber-insurance companies to offer cyber re-insurance solutions despite the existence of large enough market capacity to achieve full cyber-risk sharing. However, our analysis theoretically endorses the popular opinion that spreading i.i.d. cyber-risks that are not catastrophic is an effective practice for aggregate cyber-risk managers, a result established theoretically and empirically in the past. A failure to achieve a working re-insurance market in critically demanding situations after catastrophic cyber-risk events strongly calls for centralized government regulatory action/intervention to promote risk sharing through re-insurance activities for the benefit of service-networked societies in the IoT age.

read more

Citations
More filters
Proceedings ArticleDOI

Residual Convolutional Network for Detecting Attacks on Intrusion Detection Systems in Smart Grid

TL;DR: This study proposes a convolutional neural network-based technique, a residual neural network with 50 layers, in this technique, the tabular data are changed into images to improve the performance of the model.
Journal ArticleDOI

The government behind insurance governance: Lessons for ransomware

TL;DR: In this article , the authors propose a new conceptual framework grouping government interventions into three dimensions: regulation of risky activity, public investment in risk reduction, and co-insurance, and apply this framework to six case studies, describing insurance markets' reliance on public support in more analytically precise terms.
Journal ArticleDOI

Insurance and enterprise: cyber insurance for ransomware

Tom Baker, +1 more
TL;DR: In this paper , the authors explore how insurers addressed the evolving problems of moral hazard, uncertainty and correlated losses since the 1990s, and find that cyber insurance developed sophisticated remedies to contain liabilities and quickly restore affected IT systems, but largely left security decisions to the insured.
Journal ArticleDOI

How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs

TL;DR: This work formally establishes the reason why it has been very difficult in practice to densify IA-affected RCRM markets despite their high demand in modern CPS/ICS/IoT societies, and the efficacy of the computational policy to mitigate IA issues between the supply and demand sides of an R CRM market in such societies.
References
More filters
Journal ArticleDOI

Coherent Measures of Risk

TL;DR: In this paper, the authors present and justify a set of four desirable properties for measures of risk, and call the measures satisfying these properties "coherent", and demonstrate the universality of scenario-based methods for providing coherent measures.
Journal ArticleDOI

Threshold models of collective behavior.

TL;DR: This article developed models of collective behavior for situations where actors have two alternatives and the costs and/or benefits of each depend on how many other actors choose which alternative, and the key...
Journal ArticleDOI

Random graphs with arbitrary degree distributions and their applications.

TL;DR: It is demonstrated that in some cases random graphs with appropriate distributions of vertex degree predict with surprising accuracy the behavior of the real world, while in others there is a measurable discrepancy between theory and reality, perhaps indicating the presence of additional social structure in the network that is not captured by the random graph.
Journal ArticleDOI

Increasing risk: I. A definition

TL;DR: The authors tried to answer the question: When is a random variable Y "more variable" than another random variable X "less variable" by asking when a variable X is more variable than another variable Y.
Related Papers (5)