skip to main content
10.1145/3139367.3139426acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance

Published:28 September 2017Publication History

ABSTRACT

Historically, the financial benefits of cyber security investments have not been calculated with the same financial discipline used to evaluate other material investments. This was mainly due to a lack of readily available data on cyber incidents impacts and systematic methodology to support the efficacy of cyber investments. In this paper we propose an innovative, cyber investment management framework named RiSKi that incorporates detection and continuous monitoring of insiders societal behavior, to the extent permitted by the law, to proactively address implied anomalies and threats and their potential business impact and risks. Moreover, it provides access to published security incidents data to enable businesses to advance their understanding of cybersecurity and awareness of the threats and consequences related to cyber breaches, and, eventually, enable faster recovery from an event. RiSKI armed with the above information, employs a methodology, and develops a supporting scenario-based cyber investment tool, for quantifying the benefits of cybersecurity investments against the many ways that potential cyber risks can affect the operation of a business.

References

  1. ISTR, Internet Security Threat Report, Symantec, Vol. 22, April 2017.Google ScholarGoogle Scholar
  2. ENISA, Cybersecurity as an Economic Enabler, March 2016.Google ScholarGoogle Scholar
  3. O.H. Alhazmi, Y.K. Malaiya, and I. Ray. 2007. Measuring, analyzing and predicting security vulnerabilities in software systems. Computer Security, Elsevier, 26, 3, 219--228, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. NIST SP 800-55, "Performance Measurement Guide for Information Security", http://csrc.nist.gov/publications/nistpubs/800-55-Rev1/SP800-55-rev1.pdfGoogle ScholarGoogle Scholar
  5. LondonAssembly, Police and Crime Committee, "Tightening the net The Metropolitan Police Service's response to online theft and fraud", March 2015Google ScholarGoogle Scholar
  6. Mayer-Schönberger and K. Cukier, "Big Data: A Revolution that Will Transform how We Live, Work, and Think", Houghton Mifflin HarcourtGoogle ScholarGoogle Scholar
  7. R. Anderson, C. Barton, R. Böhme, R. Clayton, M.J. Van Eeten, M. Levi, T. Moore, and S. Savage. "Measuring the cost of cybercrime", Econ. Inf. Secur. Priv., Springer, pp. 265--300, 2013Google ScholarGoogle ScholarCross RefCross Ref
  8. L.A. Gordon and M.P. Loeb, "The economics of information security investment", ACM Transactions on Information System Security, (TISSEC), 5(4), 438--457, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. Varian, "Fifth International Conference on Electronic Commerce (ICEC), ACM, 2003, pp. 355--366Google ScholarGoogle Scholar
  10. S. Moitra, S. Konda, "The survivability of network systems: An empirical analysis", Carnegie Mellon Software Engineering Institute, Technical Report, CMU/SEI-200-TR-021.Google ScholarGoogle Scholar
  11. R. Pal and L. Golubchik, "Analyzing self-defense investments in the internet under cyber-insurance coverage", In IEEE International Conference on Distributed Computing Systems (ICDCS), 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Pal, L. Golubchik, and K. Psounis. "Aegis: A novel cyber-insurance model" IEEE/ACM GameSec, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      PCI '17: Proceedings of the 21st Pan-Hellenic Conference on Informatics
      September 2017
      322 pages

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate190of390submissions,49%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader