Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance

被引:13
|
作者
Tosh, Deepak K. [1 ]
Shetty, Sachin [2 ]
Sengupta, Shamik [3 ]
Kesan, Jay P. [4 ]
Kamhoua, Charles A. [5 ]
机构
[1] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
[2] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA 23529 USA
[3] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
[4] Univ Illinois, Coll Law, Urbana, IL USA
[5] Air Force Res Lab, Cyber Assurance Branch, Rome, NY USA
来源
基金
美国国家科学基金会;
关键词
Cybersecurity information sharing; Cyber-insurance; Cyber-threat intelligence; Cyber Security Information Sharing Act (CISA);
D O I
10.1007/978-3-319-67540-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure systems spanning from transportation to nuclear operations are vulnerable to cyber attacks. Cyber-insurance and cyber-threat information sharing are two prominent mechanisms to defend cybersecurity issues proactively. However, standardization and realization of these choices have many bottlenecks. In this paper, we discuss the benefits and importance of cybersecurity information sharing and cyber-insurance in the current cyber-warfare situation. We model a standard game theoretic participation model for cybersecurity information exchange (CYBEX) and discuss the applicability of economic tools in addressing important issues related to CYBEX and cyber-insurance. We also pose several open research challenges, which need to be addressed for developing a robust cyber-risk management capability.
引用
收藏
页码:154 / 164
页数:11
相关论文
共 50 条
  • [1] Cyber Risk Management with Risk Aware Cyber-insurance in Blockchain Networks
    Feng, Shaohan
    Xiong, Zehui
    Niyato, Dusit
    Wang, Ping
    Wang, Shaun Shuxun
    Zhang, Yang
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [2] Cyber-insurance
    不详
    [J]. NEW SCIENTIST, 2005, 186 (2505) : 30 - 30
  • [3] Data-driven analytics for cyber-threat intelligence and information sharing
    Qamar, Sara
    Anwar, Zahid
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    Chu, Bei-Tseng
    [J]. COMPUTERS & SECURITY, 2017, 67 : 35 - 58
  • [4] An Evolutionary Game-Theoretic Framework for Cyber-threat Information Sharing
    Tosh, Deepak
    Sengupta, Shamik
    Kamhoua, Charles
    Kwiat, Kevin
    Martin, Andrew
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7341 - 7346
  • [5] On the limits of cyber-insurance
    Bohme, Rainer
    Kataria, Gaurav
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 31 - 40
  • [6] Is jihadism a cyber-threat?
    Torres Soriano, Manuel R.
    [J]. REVISTA DE OCCIDENTE, 2015, (406) : 20 - 34
  • [7] Cyber-Threat Proliferation
    Kellerman, Tom
    [J]. IEEE SECURITY & PRIVACY, 2010, 8 (03) : 70 - 73
  • [8] Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-Insurance
    Li, Zhen
    Liao, Qi
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 23 - 42
  • [9] Limits to a cyber-threat
    Emerson, R. Guy
    [J]. CONTEMPORARY POLITICS, 2016, 22 (02) : 178 - 196
  • [10] The Economics of Cyber-Insurance
    Kshetri, Nir
    [J]. IT PROFESSIONAL, 2018, 20 (06) : 9 - 14