Cyber-Insurance: Missing Market Driven by User Heterogeneity

نویسندگان

  • Galina Schwartz
  • Nikhil Shetty
  • Jean Walrand
چکیده

In this paper, we explain why existing cyber-insurance contracts condition their premiums only on a client’s general features (such as the number of employees, sales volume) but do not reflect the client’s security practices. Indeed, we show that even if a competitive insurer can monitor (and enforce) security requirements for a vast majority of his clients, with only a minor fraction of the clients being able to subvert monitoring, no equilibrium contract would include security requirements. We consider arbitrary risk-averse users, whose costs of improving security are given by an arbitrary convex function. In our model, a user’s probability to incur damage (from being attacked) depends on both his own security and network security: thus, security is interdependent. We introduce two user types (normal and malicious), and allow one of the user types (malicious users) to be able to subvert insurer monitoring, even when security levels of normal users are perfectly enforceable (zero cost) for insurers. This asymmetric information causes adverse selection problem (i.e., malicious users will buy insurance, which leads to higher insurer costs). We prove that no matter how small the fraction of malicious users is, equilibrium contract that specifies user security does not exist. Thus, we demonstrate, in a general setting, a failure of cyber-insurance market to underwrite contracts conditioning user premium on user security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Competitive Cyber-Insurance and Internet Security

This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user’s probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. Thi...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk...

متن کامل

Optimal Cyber Insurance Policy Design for Dynamic Risk Management and Mitigation

Recently, with the growing number of cyber-attacks and the constant lack of effective and state-of-art defense methods, cyber risks become ubiquitous in enterprise networks, manufacturing plants, and government computer systems. Cyber-insurance has become one of the major ways to mitigate the risks as it can transfer the cyber-risks to insurance companies and improve the security status of the ...

متن کامل

Cyber-Insurance for Cyber-Security A Solution to the Information Asymmetry Problem

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, according to security experts, such software (an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010