Modeling the effect of spending on cyber security by using surplus process
In this paper, we assume the security level of a system is a quantifiable metric and apply the insurance company ruin theory in assessing the defense failure frequencies. The current security level of an information system can be viewed as the initial insurer surplus; defense investment can be viewe...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/145254 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-145254 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1452542023-05-19T07:31:18Z Modeling the effect of spending on cyber security by using surplus process Nie, Ciyu Li, Jingchao Wang, Shaun Nanyang Business School Engineering::Mathematics and analysis Budget Control Insurance In this paper, we assume the security level of a system is a quantifiable metric and apply the insurance company ruin theory in assessing the defense failure frequencies. The current security level of an information system can be viewed as the initial insurer surplus; defense investment can be viewed as premium income resulting in an increase in the security level; cyberattack arrivals follow a Poisson process, and the impact of attacks is modeled as losses on the security level. The occurrence of cyber breach is modeled as a ruin event. We use this framework to determine optimal investment in cyber security that minimizes the total cyber costs. We show by numerical examples that there is an optimal allocation of total cyber security budget to (1) IT security maintenance/upkeep spending versus (2) external cyber risk transfer. Published version 2020-12-16T02:06:23Z 2020-12-16T02:06:23Z 2020 Journal Article Nie, C., Li, J., & Wang, S. (2020). Modeling the effect of spending on cyber security by using surplus process. Mathematical Problems in Engineering, 2020, 3239591-. doi:10.1155/2020/3239591 1024-123X https://hdl.handle.net/10356/145254 10.1155/2020/3239591 2020 en Mathematical Problems in Engineering © 2020 Ciyu Nie et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Mathematics and analysis Budget Control Insurance |
spellingShingle |
Engineering::Mathematics and analysis Budget Control Insurance Nie, Ciyu Li, Jingchao Wang, Shaun Modeling the effect of spending on cyber security by using surplus process |
description |
In this paper, we assume the security level of a system is a quantifiable metric and apply the insurance company ruin theory in assessing the defense failure frequencies. The current security level of an information system can be viewed as the initial insurer surplus; defense investment can be viewed as premium income resulting in an increase in the security level; cyberattack arrivals follow a Poisson process, and the impact of attacks is modeled as losses on the security level. The occurrence of cyber breach is modeled as a ruin event. We use this framework to determine optimal investment in cyber security that minimizes the total cyber costs. We show by numerical examples that there is an optimal allocation of total cyber security budget to (1) IT security maintenance/upkeep spending versus (2) external cyber risk transfer. |
author2 |
Nanyang Business School |
author_facet |
Nanyang Business School Nie, Ciyu Li, Jingchao Wang, Shaun |
format |
Article |
author |
Nie, Ciyu Li, Jingchao Wang, Shaun |
author_sort |
Nie, Ciyu |
title |
Modeling the effect of spending on cyber security by using surplus process |
title_short |
Modeling the effect of spending on cyber security by using surplus process |
title_full |
Modeling the effect of spending on cyber security by using surplus process |
title_fullStr |
Modeling the effect of spending on cyber security by using surplus process |
title_full_unstemmed |
Modeling the effect of spending on cyber security by using surplus process |
title_sort |
modeling the effect of spending on cyber security by using surplus process |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/145254 |
_version_ |
1772826665883271168 |