Search

Analysis of the impact of cyber events for cyber insurance

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Analysis of the impact of cyber events for cyber insurance</title>
</titleInfo>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20200020752">
<namePart>Gudmundsson, Steinn</namePart>
<nameIdentifier>MAPA20200020752</nameIdentifier>
</name>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20180007255">
<namePart>Shetty, Sachin</namePart>
<nameIdentifier>MAPA20180007255</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<genre authority="marcgt">periodical</genre>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">che</placeTerm>
</place>
<dateIssued encoding="marc">2020</dateIssued>
<issuance>serial</issuance>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
</physicalDescription>
<abstract displayLabel="Summary">The mass adoption of cyber insurance will be predicated on the ability to conduct quantitative cyber risk assessment. This capability is crucial for not only providing insight into the cost of targeted threats but also providing incentives for insured enterprises to invest in protection aimed at preventing exploitation of targeted threats. Research indicates that asymmetric information, correlated loss and interdependent security issues make this difficult if insurers cannot monitor the cybersecurity efforts of the insured enterprises. In this paper, we present an analysis of cyber impacts based on cyber incidents reported in the Advisen cyber loss data feed. We show: (i) how exposure to cyber incidents varies between corporate sectors; (ii) how the type of incident relates to the number of entities and individuals affected by it; (iii) how the type of incident relates to the eventual financial cost; (iv) what type of information is most frequently compromised; (v) a breakdown of the main actors behind cyber incidents; and (vi) howtree-based classifiers can be used to gain insight into cyber risk indicators affectingthe cost of incidents.</abstract>
<note type="statement of responsibility">Kjartan Palsson, Steinn Gudmundsson, Sachin Shetty</note>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20170003779">
<topic>Seguro de ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20160007633">
<topic>Ciberriesgos</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080590567">
<topic>Empresas de seguros</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20140022700">
<topic>Ciberseguridad</topic>
</subject>
<subject xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080591182">
<topic>Gerencia de riesgos</topic>
</subject>
<classification authority="">328.3</classification>
<relatedItem type="host">
<titleInfo>
<title>Geneva papers on risk and insurance : issues and practice</title>
</titleInfo>
<originInfo>
<publisher>Geneva : The Geneva Association, 1976-</publisher>
</originInfo>
<identifier type="issn">1018-5895</identifier>
<identifier type="local">MAP20077100215</identifier>
<part>
<text>01/10/2020 Volumen 45 Número 4 - octubre 2020 , p. 564-579</text>
</part>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">201015</recordCreationDate>
<recordChangeDate encoding="iso8601">20201020131143.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20200032830</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>