Introduction - Economics of Security

advertisement
Cyberinsurance As A Market-Based
Solution To the Problem of Cybersecurity
Jay Kesan Ruperto Majuca* William Yurcik*
College of Law
Department of Economics
NCSA
University of Illinois at Urbana-Champaign
{kesan,majuca,yurcik}@uiuc.edu
Workshop on the Economics of Information Security ‘05
Harvard University
Outline



Emergence of Cyberinsurance
Current Cyberinsurance Practices
Economic Theory



Ideal World
Real World
Summary
Outline



Emergence of Cyberinsurance
Current Cyberinsurance Practices
Economic Theory



Ideal World
Real World
Summary
The Problem

Pervasive software vulnerabilities & increased
availability of hacking tools have resulted in a
consistently increasing myriad of attacks:
 host-based attacks (theft of credit card numbers, invasion
of privacy, etc.)
 insider attacks that damage information assets
 network DoS availability attacks


Surveys consistently show ~75% of businesses
suffer financial losses due to security breaches
InformationWeek estimates annual losses (in the
USA) due to security breaches at billions of dollars
Why Is This Happening?
Why Is This Happening?
Security Market Failure
Why Is This Happening?
Security Market Failure
1.
Imperfect information

2.
Externalities

3.
Consumers do not know security of software
Security is interdependent and damage is not
fully borne by “guilty” parties
Security as a Public Good

Risks are shared but incentive to free-ride
Correcting Market Failure
1.
Imperfect Information

2.
Perfect information may not be possible
Externalities

Assign cyber-property rights through laws
 enforcement is slow with high transaction costs
3.
Security as Public Good

International regulation for broad protections
 funding, long timeframe, divergent interests
Risk Management Market Solutions
1. Avoid the Risk

Disconnect from the Internet
2. Mitigate the Risk

Security processes to reduce magnitude of expected loss
3. Retain the Risk

Self-insurance or gambling
4. Transfer the Risk via Contract

Guarantees/warranties, service agreements, outsourcing
5. Transfer the Risk via an Insurance Product

Insurance premiums internalized as cost-of-doing-business
Risk Management Market Solutions
1. Avoid the Risk

Disconnect from the Internet
2. Mitigate the Risk

Security processes to reduce magnitude of expected loss
3. Retain the Risk

Self-insurance or gambling
4. Transfer the Risk via Contract

Guarantees/warranties, service agreements, outsourcing
5. Transfer the Risk via an Insurance Product

Insurance premiums internalized as cost-of-doing-business
Inadequacy of Traditional Insurance
 Traditional insurance policies
 designed to cover traditional perils
 cyber-risks are new
 time dynamics; attacks & software flaws exposed daily
 Cyber-properties are without physical form
 attacks do not leave physical damage
 insurers dispute what constitutes “physical” damage to
“tangible” property, draft more exclusions, and offer new
insurance products to stack case against inclusion
 Most cyber-torts are international
 most 3rd party insurance coverage are not international
Outline



Emergence of Cyberinsurance
Current Cyberinsurance Practices
Economic Theory



Ideal World
Real World
Summary
Net Advantage
Security
e-Comprehensive
Destruction, disruption or theft of
information assets
Y
Y
Y
Internet Business Interruption
Y
Y
Y
Cyberextortion
Y
Y
Y
Fraudulent electronic transfers
N
Y
N
Denial of service attack
Y
Y
Rehabilitation expenses
Y
Y
Insurance
Coverage
Webnet
Protection
FIRST PARTY
THIRD PARTY LIABILITY
Internet Content
Y
Y
Y
Internet Security
Y
Y
Y
Defense Costs
Y
Y
Y
Inability to use or lack of performance
of software programs
Y
Y
Y
Ordinary wear and tear of insured’s
information assets
Y
Y
Y
Electric and telecommunication
failures
Y
Y
Y
EXCLUSIONS
Net Advantage
Security
e-Comprehensive
Destruction, disruption or theft
of information assets
Y
Y
Y
Internet Business Interruption
Y
Y
Y
Cyberextortion
Y
Y
Y
Fraudulent electronic transfers
N
Y
N
Denial of service attack
Y
Y
Rehabilitation expenses
Y
Y
Insurance
Coverage
Webnet
Protection
FIRST PARTY
THIRD PARTY LIABILITY
Internet Content
Y
Y
Y
Internet Security
Y
Y
Y
Defense Costs
Y
Y
Y
Inability to use or lack of performance
of software programs
Y
Y
Y
Ordinary wear and tear of insured’s
information assets
Y
Y
Y
Electric and telecommunication
failures
Y
Y
Y
EXCLUSIONS
Net Advantage
Security
e-Comprehensive
Destruction, disruption or theft of
information assets
Y
Y
Y
Internet Business Interruption
Y
Y
Y
Cyberextortion
Y
Y
Y
Fraudulent electronic transfers
N
Y
N
Denial of service attack
Y
Y
Rehabilitation expenses
Y
Y
Insurance
Coverage
Webnet
Protection
FIRST PARTY
THIRD PARTY LIABILITY
Internet Content
Y
Y
Y
Internet Security
Y
Y
Y
Defense Costs
Y
Y
Y
Inability to use or lack of performance
of software programs
Y
Y
Y
Ordinary wear and tear of insured’s
information assets
Y
Y
Y
Electric and telecommunication
failures
Y
Y
Y
EXCLUSIONS
Net Advantage
Security
e-Comprehensive
Destruction, disruption or theft of
information assets
Y
Y
Y
Internet Business Interruption
Y
Y.
Y
Cyberextortion
Y
Y
Y
Fraudulent electronic transfers
N
Y
N
Denial of service attack
Y
Y
Rehabilitation expenses
Y
Y
Insurance
Coverage
Webnet
Protection
FIRST PARTY
THIRD PARTY LIABILITY
Internet Content
Y
Y
Y
Internet Security
Y
Y
Y
Defense Costs
Y
Y
Y
Inability to use or lack of
performance of software
Y
Y
Y
“Software Aging” of
insured’s information assets
Y
Y
Y
Electric and telecommunication
failures
Y
Y
Y
EXCLUSIONS
Outline



Emergence of Cyberinsurance
Current Cyberinsurance Practices
Economic Theory



Ideal World
Real World
Summary
Ideal World (our previous work)
1. Cyberinsurance increases IT Safety because the
insured increases self-protection as rational
response to the reduction of premium
2. Cyberinsurance facilitates standards of liability
3. Cyberinsurance increases social welfare by solving
market failure (Internet risks transfer)
Measuring Welfare Gains
Income in good state
A
|Slope| =
price of insurance
Welfare gains
measure
B
Certainty line
E
I1e
expenditure
on insurance
F
I*
I**
45o
Amount of insurance
coverage
I0e
I**
I*
Income in bad state
Income in good state
A
$ 47.04 million
|slope|= .06
B
Certainty line
$ 3.14 Bn
I**
45o
$ 1.94 Bn
I**
Income in bad state
Example: 2000 DOS attacks
Calculating the Premiums

Following Cochrane (1997), total premiums insured
is willing to pay may be calculated:
1
( I m  ) (1 )  p  I 0e
1
 (1  p)  I1e
where I m  p  I 0e  (1  p)  I1e .

Solving for Π:

  Im  p  I

e1
0
 (1  p)  I

1
e1 1
1
.
Calculated welfare gains and premiums for different
risk aversion levels and probabilities of cyber-loss
 results: increasing social welfare and premiums with
probability of attack and risk aversion
Real World

Adverse Selection
 insurers cannot distinguish between high and low risk

Moral Hazard
 firms may slack in their security work after being insured

Others
 lack of actuarial data, pricey premiums, interrelated risks
Adverse Selection

Separate high/low risk using risk assessment
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Adverse Selection
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Adverse Selection
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Adverse Selection
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Adverse Selection
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Adverse Selection
Income in good state
Certainty line
Welfare
Loss
Measure
A
Ap
B
E
P
FL
FH
45o
I0 p
IfH
IfL
Income in bad state
Solution to Adverse Selection

Evaluation of applicants’ security through
offsite and on-site activities
 detailed questionnaire: assesses applicant’s risks
exposure, services offered, and network security
 baseline risk assessment: physical location’s
security, network’s design and activities, physical
review of security, incident response, procedures etc.
 recommendations for upgrades and fixes
Solutions to Moral Hazard
Net Advantage
Security
e-Comprehensive
Failure to back-up
Y
Y
Y
Failure to take reasonable steps to
maintain and upgrade security
Y
Y
Y
Retentions
Y
Y
Y
Liability Limits
Y
Y
Y
Criminal Reward Fund/
Investigative Expenses Covered
Y
Policy Provisions
Webnet
Protection
EXCLUSIONS
OTHER RELEVANT PROVISIONS
Services by Information Risk Group to
mitigate the impact of 1st party loss,
covered
Y
Y
Representations Relied Upon
Y
Y
Y
Regular/Annual Surveys of Insured’s
Facilities
Y
Y
Y
Solutions to Moral Hazard
Net Advantage
Security
e-Comprehensive
Failure to back-up
Y
Y
Y
Failure to take reasonable steps
to maintain and upgrade security
Y
Y
Y
Retentions
Y
Y
Y
Liability Limits
Y
Y
Y
Criminal Reward Fund/
Investigative Expenses Covered
Y
Policy Provisions
Webnet
Protection
EXCLUSIONS
OTHER RELEVANT PROVISIONS
Services by Information Risk Group to
mitigate the impact of 1st party loss,
covered
Y
Y
Representations Relied Upon
Y
Y
Y
Regular/Annual Surveys of Insured’s
Facilities
Y
Y
Y
Solutions to Moral Hazard
Net Advantage
Security
e-Comprehensive
Failure to back-up
Y
Y
Y
Failure to take reasonable steps to
maintain and upgrade security
Y
Y
Y
Retentions
Y
Y
Y
Liability Limits
Y
Y
Y
Criminal Reward Fund/
Investigative Expenses Covered
Y
Policy Provisions
Webnet
Protection
EXCLUSIONS
OTHER RELEVANT PROVISIONS
Services by Information Risk
Group to mitigate the impact of
1st party loss, covered
Y
Y
Representations Relied Upon
Y
Y
Y
Regular/Annual Surveys of Insured’s
Facilities
Y
Y
Y
Solutions to Moral Hazard
Net Advantage
Security
e-Comprehensive
Failure to back-up
Y
Y
Y
Failure to take reasonable steps to
maintain and upgrade security
Y
Y
Y
Retentions
Y
Y
Y
Liability Limits
Y
Y
Y
Criminal Reward Fund/
Investigative Expenses Covered
Y
Policy Provisions
Webnet
Protection
EXCLUSIONS
OTHER RELEVANT PROVISIONS
Services by Information Risk Group to
mitigate the impact of 1st party loss,
covered
Y
Y
Representations Relied Upon
Y
Y
Y
Regular/Annual Surveys of
Insured’s Facilities
Y
Y
Y
Solutions to Moral Hazard
Net Advantage
Security
e-Comprehensive
Failure to back-up
Y
Y
Y
Failure to take reasonable steps to
maintain and upgrade security
Y
Y
Y
Retentions
Y
Y
Y
Liability Limits
Y
Y
Y
Criminal Reward Fund/
Investigative Expenses Covered
Y
Policy Provisions
Webnet
Protection
EXCLUSIONS
OTHER RELEVANT PROVISIONS
Services by Information Risk Group to
mitigate the impact of 1st party loss,
covered
Y
Y
Representations Relied Upon
Y
Y
Y
Regular/Annual Surveys of Insured’s
Facilities
Y
Y
Y
Outline



Emergence of Cyberinsurance
Current Cyberinsurance Practices
Economic Theory



Ideal World
Real World
Summary
Summary
In Theory - cyberinsurance can correct Internet risk
transfer market failure (economic modeling)
In Practice - cyberinsurers are slowly resolving realworld problems but some issues are still remain
(case study results)
Cyberinsurance is still the direction but it will take
time, patient perseverance rather than giving up on
this market solution.
Questions?
<http://www.ncassr.org/projects/econsec/>
backup slides
Insurance and Interdependent
Risks





IT security is interdependent, e.g., an infected
machine can cause infection of others
Ortzag and Stiglitz 2002:
Two distortions: interdependent risks results in care
below the social optimum & insurance coverage also
reduces the precaution level.
But if level of precaution can be observed and
insurance premium tied to precaution level, moral
hazard disappears & full insurance ensue
Suggestions (regulation, taxes and fees)
Developing Cyberliability Law
 Higher standards for certain firms/activities:
 Financial firms: prevent data in databases from being leaked
out or used for identity theft (GLB Act & security regulations)
 Health care providers: ensure integrity/security of protected
health information (HIPAA & security regulations)
 Firms that gather data relating to children to safeguard it
 Those covered by consent decrees; others
 Those not covered by specific regulations and
consent decrees have general common law duty to
safeguard data under their control.
Cyberinsurance, Self-Insurance and
Self-protection
Cyberinsurance
“Complements” if premiums
tied to self-protection level.
(Cyberinsurance increases
self-protection, i.e.
no moral hazard)
“Substitutes”:
(High demand
for one lowers
the other’s)
Self-insurance
“Substitutes”
(Availability of one would
discourage the other.
Self-insurance likely to
create a “moral hazard”)
Self-protection
Socially-Optimal Precaution Level
$
E(SC)=p(x)L+wx total social costs
wx
p(x)L
0
X*
precaution costs
expected losses
Precaution
Efficiency requires minimizing total costs; occurs if
w
=
- p’(x*)L
(marginal social cost)
(marginal social benefit)
Cyberinsurance Premiums
and Welfare Gains (in Millions)
Risk Aversion

1
1.5
2
2.5
3
Premium
p= γ = 0.005
0.01
0.02
0.03
0.04
0.05
0.06
$1.55
$3.08
$6.09
$9.03
$11.90
$14.69
$17.42
$2.54
$5.02
$9.90
$14.64
$19.25
$23.72
$28.07
$3.67
$7.29
$14.34
$21.17
$27.76
$34.14
$40.30
$5.03
$9.96
$19.54
$28.75
$37.60
$46.10
$54.26
$6.62
$13.10
$25.60
$37.54
$48.93
$59.79
$70.15
Welfare Gains
p= γ = 0.005
0.01
0.02
0.03
0.04
0.05
0.06
$1.59
$3.23
$6.69
$10.37
$14.28
$18.41
$22.76
$2.57
$5.19
$10.58
$16.17
$21.95
$27.92
$34.08
$3.73
$7.49
$15.12
$22.89
$30.80
$38.85
$47.04
$5.09
$10.18
$20.41
$30.70
$41.03
$51.41
$61.84
$6.69
$13.35
$26.60
$39.75
$52.81
$65.79
$78.69
Download