Weis2010 Boehme Pres

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

Interational Computer Science Institute & University of California, Berkeley

Modeling Cyber-Insurance
Towards a Unifying Framework

?
Rainer Böhme , Galina Schwartz†
∗ †
Networking Group, ICSI Berkeley EECS, UC Berkeley

Workshop on the Economics of Information Security, Harvard, 8 June 2010


Talks on Cyber-Insurance at WEIS

2002 2003 2004 2005 2006 2007 2008 2009 2010

enthusiasm
obstacles

WEIS, Harvard, 8 June 2010 Slide 2 of 26


Outline

1. Characteristics of Cyber-Risk

2. Framework Overview

3. Selected Features
– Network topology
– Unified approach to interdependent security and correlated risk

4. “Results” and Conclusion

WEIS, Harvard, 8 June 2010 Slide 4 of 26


1
Characteristics of Cyber-Risk
WEIS, Harvard, 8 June 2010 Slide 5 of 26
What Is Specific to Cyber-Risk ?

success factors of ICT risk properties

distribution & interconnection → interdependent security


own risk depends on
other parties’ actions

universality & reuse → risk propagation & correlation


incidents cause further
incidents
+
= complexity → imperfect information

WEIS, Harvard, 8 June 2010 Slide 6 of 26


Examples
Conventional risks in the economic insurance literature
neither interdependence nor correlation

Airline baggage security


interdependence, but no correlation

Kunreuther & Heal, 2003


Natural disasters in the actuarial literature
spatial correlation, but no interdependence

Embrechts et al., 1999


Cyber-insurance
both interdependence and correlation, but never modeled together

WEIS, Harvard, 8 June 2010 Slide 7 of 26


Talks on Cyber-Insurance at WEIS
interdependent security (IDS)
correlated risk
information asymmetries

2002 2003 2004 2005 2006 2007 2008 2009 2010

enthusiasm
obstacles

WEIS, Harvard, 8 June 2010 Slide 8 of 26


Risk Properties
in the Cyber-Insurance Literature
information asymmetries

Bandyopadhyay et al., 2009

Shetty et al., 2009


Radosavac et al., 2008
Ogut et al., 2005
Böhme, 2005 Hofmann, 2007
Böhme & Kataria, 2006 Bolot & Lelarge, 2008
Lelarge & Bolot, 2009

correlated risk interdependent security (IDS)


WEIS, Harvard, 8 June 2010 Slide 9 of 26
2
Framework Overview
WEIS, Harvard, 8 June 2010 Slide 10 of 26
Framework

design
1.
2. 3.
network utility
demand side supply side
environment
(agents) (insurers)
(nodes)
risk risk

WEIS, Harvard, 8 June 2010 Slide 11 of 26


Talks on Cyber-Insurance at WEIS
market models

2002 2003 2004 2005 2006 2007 2008 2009 2010

enthusiasm
obstacles

WEIS, Harvard, 8 June 2010 Slide 12 of 26


Framework

design
1.
2. 3.
network utility
demand side supply side
environment
(agents) (insurers)
(nodes)
risk risk

WEIS, Harvard, 8 June 2010 Slide 13 of 26


Framework

nature players

1.
2. 3.
network
demand side supply side
environment
(agents) (insurers)
(nodes)

WEIS, Harvard, 8 June 2010 Slide 13 of 26


Framework

4. information structure

1.
2. 3.
network
demand side supply side
environment
(agents) (insurers)
(nodes)

5. organizational environment

WEIS, Harvard, 8 June 2010 Slide 13 of 26


Overview of Model Attributes

1. network environment 2. demand side 3. supply side


defense function node control market structure
network topology heterogeneity insurers’ risk aversion
risk arrival agents’ risk aversion markup
attacker model action space contract design
time higher-order risk transfer

4. information structure 5. organizational environment


IA in conventional insurance regulator
IA specific to cyber-insurance ICT manufacturers
timing network intermediaries
security service providers

WEIS, Harvard, 8 June 2010 Slide 14 of 26


Variables of Interest

Breadth of market
Under which conditions will a market for cyber-insurance thrive?

Network security
Can we expect fewer attacks if cyber-insurance is broadly adopted?

Social welfare
Will the world be a better place with cyber-risk reallocation?

WEIS, Harvard, 8 June 2010 Slide 15 of 26


3
Selected Features
WEIS, Harvard, 8 June 2010 Slide 16 of 26
Network Topology
Examples

ideosyncratic fully connected single-factor model Erdös-Rényi graph

hardware failure email spam OS vulnerability inter-organizational


dependence

→ Comprehensive insurance policies represent bundles of contracts.

WEIS, Harvard, 8 June 2010 Slide 17 of 26


Unified Approach to IDS and Correlation
Defense function for node i:

P (Li = l) = D(l, wi , s, G, x)

l size of loss (random variable Li )


wi initial wealth
s vector of security investments: s = si ∪ sj6=i
G network topology as model of interconnectedness
Simplification: fix w and normalize l = 1, then let pi be the probability of a
loss at node i and X ∈ {0, 1}n be a random vector of realized
losses per node.

Proposition: interdependent security and correlated risk can be modeled


jointly by making s and realizations x of X parameters of D.

WEIS, Harvard, 8 June 2010 Slide 18 of 26


Illustration
connected in G
Node i Node j

security si interdependent security security sj

D D

probability pi probability pj

nature nature

loss event xi correlated risk loss event xj

Risk propagation is hard to tract: the modeling requires recursive methods or


approximations and it may lead to dynamic equilibria.

WEIS, Harvard, 8 June 2010 Slide 19 of 26


4
“Results” and Conclusion
WEIS, Harvard, 8 June 2010 Slide 20 of 26
Dependent Variables
in the Cyber-Insurance Literature
social welfare

Shetty et al., 2009

Bandyopadhyay et al., 2009


Ogut et al., 2005
Hofmann, 2007
Böhme, 2005 Radosavac et al., 2008
Böhme & Kataria, 2006 Bolot & Lelarge, 2008
Lelarge & Bolot, 2009

breadth of market network security

WEIS, Harvard, 8 June 2010 Slide 21 of 26


Discrepancy
between Statements and Models

Cyber-insurers will improve information about security levels;

. . . but relevant parameters not included in the model.

Cyber-insurers will positively affect agents’ decisions in shaping


the network environment;

. . . but existing models of contracts do not reflect these choices.

Broad adoption of cyber-insurerance will change the market


structure and behavior of ICT manufacturers;

. . . but never modeled parametrically.

WEIS, Harvard, 8 June 2010 Slide 22 of 26


Endogenize!
Future modeling approaches should endogenize key parameters of the
network environment, information structure, and organizational environment.

Example:
endogenous network formation to model platform switching dynamics

WEIS, Harvard, 8 June 2010 Slide 23 of 26


Framework

4. information structure

design
1.
2. 3.
network utility
demand side supply side
environment
(agents) (insurers)
(nodes)
risk risk

5. organizational environment

WEIS, Harvard, 8 June 2010 Slide 24 of 26


Endogenize!
Future modeling approaches should endogenize key parameters of the
network environment, information structure, and organizational environment.

Example:
endogenous network formation to model platform switching dynamics

Policy recommendations need better foundations in analytical models.

WEIS, Harvard, 8 June 2010 Slide 25 of 26


Talks on Cyber-Insurance at WEIS

...
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011

enthusiasm
obstacles

WEIS, Harvard, 8 June 2010 Slide 26 of 26


Talks on Cyber-Insurance at WEIS

...
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011

enthusiasm
obstacles

WEIS, Harvard, 8 June 2010 Slide 26 of 26


Interational Computer Science Institute & University of California, Berkeley

Q&A

Thank you for your attention.

?
Rainer Böhme , Galina Schwartz†
∗ †
Networking Group, ICSI Berkeley EECS, UC Berkeley

Workshop on the Economics of Information Security, Harvard, 8 June 2010

You might also like