Kontaktujte nás | Jazyk: čeština English
dc.title | Designing model for calculating the amount of cyber risk insurance | en |
dc.contributor.author | Piromsopa, Krerk | |
dc.contributor.author | Klíma, Tomáš | |
dc.contributor.author | Pavlík, Lukáš | |
dc.relation.ispartof | Proceedings - 2017 4th International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2017 | |
dc.identifier.isbn | 978-1-5386-2820-1 | |
dc.date.issued | 2018 | |
utb.relation.volume | 2018-January | |
dc.citation.spage | 196 | |
dc.citation.epage | 200 | |
dc.event.title | 4th International Conference on Mathematics and Computers in Sciences and in Industry, MCSI 2017 | |
dc.event.location | Corfu Island | |
utb.event.state-en | Greece | |
utb.event.state-cs | Řecko | |
dc.event.sdate | 2017-08-24 | |
dc.event.edate | 2017-08-27 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/MCSI.2017.41 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/8326840/ | |
dc.subject | security | en |
dc.subject | insurance | en |
dc.subject | risk management | en |
dc.subject | information system | en |
dc.subject | cyber risk | en |
dc.description.abstract | In the last few years, rising sophistication and impact of cyberattacks has led companies to reassessment of their approach to risk management. Many of them admitted that they are not able to successfully prevent these attacks and they tried to find other ways to mitigate the risk. One of the possible solutions can be a cybersecurity insurance that enables companies to transfer the risk connected with a security breach to an insurance company. Basic problem is then how the cost of insurance should be calculated and how to assess the level of client's IT security controls and related risk. Unlike traditional insurance that derives the premium from target value and statistical models, the cyber insurance should take into account other factors. In this article, authors propose scoring model for cyber insurance that is based on the results of internal and external audits and compliance with mandatory and voluntary standards. © 2017 IEEE. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1008156 | |
utb.identifier.obdid | 43877650 | |
utb.identifier.scopus | 2-s2.0-85050336797 | |
utb.identifier.wok | 000452189900035 | |
utb.source | d-scopus | |
dc.date.accessioned | 2018-08-29T08:26:57Z | |
dc.date.available | 2018-08-29T08:26:57Z | |
dc.description.sponsorship | TBU IGA project: Design methodology for determination of prices also of the information system organization in terms of cyber risks [IGA/FAI/2017/008] | |
utb.contributor.internalauthor | Pavlík, Lukáš | |
utb.fulltext.affiliation | Krerk Piromsopa Department of Computer Engineering Chulalongkorn University Bangkok, Thailand krerk@cp.eng.chula.ac.th Tomas Klima Department of System Analysis University of Economics Prague, Czech republic the.book@seznam.cz Lukas Pavlik Department of Safety Engineering Tomas Bata University in Zlin Zlin, Czech republic lpavlik@fai.utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.references | [1] Check Point. Check Point 2013 security report. Israel, 2013. [2] Verizon. 2013 Data breach investigations report. New York, 2013. [3] Verizon. 2015 Data breach investigations report. New York, 2015. [4] Naghizadeh, P.; Mingyan Liu, "Closing the price of anarchy gap in the interdependent security game," Information Theory and Applications Workshop (ITA), 2014, vol., no., pp.1,8, 9-14 Feb. 2014 [5] Johnson, B.; Laszka, A.; Grossklags, J., "The Complexity of Estimating Systematic Risk in Networks," Computer Security Foundations Symposium (CSF), 2014 IEEE 27th, vol., no., pp.325, 336, 19-22 July 2014 [6] Pal, R.; Golubchik, L.; Psounis, K.; Pan Hui, "On a way to improve cyber-insurer profits when a security vendor becomes the cyber-insurer," IFIP Networking Conference, 2013, vol., no., pp.1,9, 22-24 May 2013 [7] Schwartz, G.; Shetty, N.; Walrand, J., "Why cyber-insurance contracts fail to reflect cyber-risks,", 2013 51st Annual Allerton Conference on Communication, Control, and Computing, vol., no., pp.781,787, 2-4 Oct. 2013 [8] Sadhukhan, S.K., "Insuring Big Losses Due to Security Breaches through Insurance: A Business Model," System Sciences, 2007. 40th Annual Hawaii International Conference on System Sciences (HICSS'07), vol., no., pp.158a,158a, Jan. 2007 [9] Pandey, P.; Snekkenes, E.A., "Applicability of Prediction Markets in Information Security Risk Management", 2014 25th International Workshop on Database and Expert Systems Applications (DEXA), vol., no., pp.296,300, 1-5 Sept. 2014 | |
utb.fulltext.sponsorship | This paper was supported by the TBU IGA project: Design methodology for determination of prices also of the information system organization in terms of cyber risks, registred under IGA/FAI/2017/008. | |
utb.wos.affiliation | [Piromsopa, Krerk] Chulalongkorn Univ, Dept Comp Engn, Bangkok, Thailand; [Klima, Tomas] Univ Econ, Dept Syst Anal, Prague, Czech Republic; [Pavlik, Lukas] Tomas Bata Univ Zlin, Dept Safety Engn, Zlin, Czech Republic | |
utb.scopus.affiliation | Department of Computer Engineering, Chulalongkorn University, Bangkok, Thailand; Department of System Analysis, University of Economics, Prague, Czech Republic; Department of Safety Engineering, Tomas Bata University in Zlin, Zlin, Czech Republic | |
utb.fulltext.projects | IGA/FAI/2017/008 |