210 likes | 333 Views
Modelling and Economics of IT Risk Management and Insurance. Stefanos Gritzalis Costas Lambrinoudakis Dept. of Information and Communication Systems Engineering University of the Aegean - GREECE { sgritz , clam}@aegean.gr Thanassis Yannacopoulos
E N D
Modelling and Economics of IT Risk Management and Insurance Stefanos Gritzalis Costas Lambrinoudakis Dept. of Information and Communication Systems Engineering University of the Aegean - GREECE {sgritz, clam}@aegean.gr Thanassis Yannacopoulos Dept. of Statistics & Actuarial-Financial Mathematics University of the Aegean - GREECE ayannaco@aegean.gr
Information systems security has become a top priority issue for most organisations worldwide. • They have started to invest in Security Enhancing Technologies, but: • How much should they invest ? • Can they evaluate the effectiveness of the security measures that they invest on ? • Are they aware of the residual risk ? • Are they aware of the consequences that they will face in the event of a security incident ? Introduction
Risk Analysis and Management Measure Asset Threat Vulnerability Impact Calculate Risk Select Countermeasures
We need better solutions • An option could be to transfer specific risks to an insurance company, in order to: • avoid implementing too expensive technical countermeasures, and • cover the financial losses that the organisation may experience in case of a security incident • Clearly, such an approach will not replace technical security measures, but it will act complementary
Issues that must be addressed From the Organization Point of View How much money should be invested in technical security measures ? Which is the financial loss that the organization will experience as a result of a security incident due to the residual risk ? From the Insurance Company Point of View How secure – well protected against potential risks - is the information system ? Which is the financial loss that the organization will experience as a result of every possible security incident ? What should the structure of the contract be (i.e. premium, compensation) ?
Modelling the System (1/3) Use of a probabilistic structure, in the form of a Markov model, that provides detailed information about all possible transitions of the system state in the course of time. We are dealing with transitions from the fully operational system state to some other non-fully operational state that may result as the effect of a security incident.
Modelling the System (2/3) Assumption 1: The transitions allowed are from the fully operational state to some other non-fully operational state. Assumption 2: Non-operational states are considered absorbing states.
Modelling the System (3/3) The use of the Markov model allows us to : Find the probability of the system being in different states thus find the probability of different financial losses (L) This approach is useful in cases where: The transition rates are accurate The Loss (impact values) figures are accurate (objective)
Using the Model: An Overview OBJECTIVE 1: Calculating the Optimal Security Investment Max I E [ U(W – L(I) – I ] Where I is the maximum amount available for security measures W is the initial wealth of the company and L is the expected loss, that of course depends on the amount I OBJECTIVE 2: Designing the Optimal Insurance Contract U(W – π) = Ε [ U(W – L + C – π)] Where W is the initial wealth of the company πis the premium that the company has to pay to the insurer L is the expected loss C is the compensation that the insurer will pay in case of a security incident
OBJECTIVE 1: Calculating the Optimal Security Investment (1/3) • How much should a company invest in security? • Given a security budget, how should this be allocated with respect to the different risks so as to minimize the expected loss of the company?
An Illustrative Example (2/3) • Assume two Threats of equal probability to occur and equally harmful • Assume that we invest zi for security measures that address Threat I, i=1,2 • It can be noticed that the optimal choice is z1=z2 z1 z2
An Illustrative Example (3/3) • Assume two Threats equally harmful • Assume that the first Threats is more likely to occur • Assume that we invest zi for security measures that address Threat I, i=1,2 • It can be noticed that the optimal budget allocates more expenditure towards the facing of the first threat z1 z2
OBJECTIVE 2: Design the Optimal Insurance Contract (1/7) • Following the investment of an amount of money for security measures, the company still needs to deal with the residual risk. • An option could be to divert the risk into an alternative market: An Insurance Company • The model presented may support us in designing and pricing insurance contracts
A Case Study (2/7) • Suppose a firm A subcontracts specific IT tasks to a firm B • Unfortunately A cannot be aware of B’s intentions (e.g. B may disclose data in an unauthorized way, for profit) • Can A and B enter into an insurance contract through an insurer I so that all three parties are better off with the contract than without?
A Case Study (3/7) • ν: Probability that B plays fair • d: Probability that the fraud passes undiscovered • p1: Given that B plays fair, probability of no security incident at all • p2: Given that B plays fair, probability of a security incident due to unforeseen circumstances or due to negligence of A
Premium for A (5/7) • Premium Maximum Value (1) when: • d= 1 and ν = 0 (B acts maliciously and the fraud will not be discovered) • Premium Minimum Value when: • ν = 1 and d= 0 (B is reliable and in case it commits a fraud it will be discovered)
Premium for B (6/7) • The introduction of the fine (F) lowers considerably the premium for B. • The fine plays the role of compensation to the insurer in case of deliberate fraudulent behavior and as such reduces the risk of the insurer
Future Directions We are currently thinking of ways to cope with: Non-absorbing states Approximate transition rates Subjective figures for the Loss (An indicative example is Privacy Violation) More complex models that in order to calculate the transition probability of the system to a different state take into account the full history of transitions Use of real data for Model Calibration
Thank you for your attention..http://www.aegean.gr/Info-Sec-Lab/