Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance

被引:13
|
作者
Tosh, Deepak K. [1 ]
Shetty, Sachin [2 ]
Sengupta, Shamik [3 ]
Kesan, Jay P. [4 ]
Kamhoua, Charles A. [5 ]
机构
[1] Norfolk State Univ, Dept Comp Sci, Norfolk, VA 23504 USA
[2] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA 23529 USA
[3] Univ Nevada, Dept Comp Sci & Engn, Reno, NV 89557 USA
[4] Univ Illinois, Coll Law, Urbana, IL USA
[5] Air Force Res Lab, Cyber Assurance Branch, Rome, NY USA
来源
基金
美国国家科学基金会;
关键词
Cybersecurity information sharing; Cyber-insurance; Cyber-threat intelligence; Cyber Security Information Sharing Act (CISA);
D O I
10.1007/978-3-319-67540-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructure systems spanning from transportation to nuclear operations are vulnerable to cyber attacks. Cyber-insurance and cyber-threat information sharing are two prominent mechanisms to defend cybersecurity issues proactively. However, standardization and realization of these choices have many bottlenecks. In this paper, we discuss the benefits and importance of cybersecurity information sharing and cyber-insurance in the current cyber-warfare situation. We model a standard game theoretic participation model for cybersecurity information exchange (CYBEX) and discuss the applicability of economic tools in addressing important issues related to CYBEX and cyber-insurance. We also pose several open research challenges, which need to be addressed for developing a robust cyber-risk management capability.
引用
收藏
页码:154 / 164
页数:11
相关论文
共 50 条
  • [31] Risk Assessment of Sharing Cyber Threat Intelligence
    Albakri, Adham
    Boiten, Eerke
    Smith, Richard
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
  • [32] Cyber-Terror-Looming Threat or Phantom Menace? The Framing of the US Cyber-Threat Debate
    Cavelty, Myriam Dunn
    JOURNAL OF INFORMATION TECHNOLOGY & POLITICS, 2008, 4 (01) : 19 - 36
  • [33] A Coalitional Cyber-Insurance Framework for a Common Platform
    Vakilinia, Iman
    Sengupta, Shamik
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) : 1526 - 1538
  • [34] On Differentiating Cyber-Insurance Contracts A Topological Perspective
    Pal, Ranjan
    Hui, Pan
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 836 - 839
  • [35] Social Process for Cyber-Threat Analysis (SPCTA)
    Brown, Harry, III
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 441 - 449
  • [36] Cyber-threat protection strategies for small businesses
    Carver, Michael
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 247
  • [37] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 36
  • [38] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    International Journal of Critical Infrastructure Protection, 2022, 36
  • [39] Preventing unauthorized islanding: Cyber-threat analysis
    Simmons, Sharon
    Edwards, Dennis
    Wilde, Norman
    Just, Jiri
    Satyanarayana, Mahidhar
    PROCEEDINGS OF THE 2006 IEEE/SMC INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING, 2006, : 178 - +
  • [40] A Coalitional Cyber-Insurance Design Considering Power System Reliability and Cyber Vulnerability
    Lau, Pikkin
    Wang, Lingfeng
    Liu, Zhaoxi
    Wei, Wei
    Ten, Chee-Wooi
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (06) : 5512 - 5524