Designing cyber insurance policies: The role of pre-screening and security interdependence

MM Khalili, P Naghizadeh, M Liu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber insurance is a viable method for cyber risk transfer. However, it has been shown that
depending on the features of the underlying environment, it may or may not improve the …

Security adoption and influence of cyber-insurance markets in heterogeneous networks

Z Yang, JCS Lui - Performance Evaluation, 2014 - Elsevier
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worm attack.
Despite the awareness of these risks and the importance of network/system security …

Embracing and controlling risk dependency in cyber-insurance policy underwriting

MM Khalili, M Liu, S Romanosky - Journal of Cybersecurity, 2019 - academic.oup.com
This article highlights how cyber risk dependencies can be taken into consideration when
underwriting cyber-insurance policies. This is done within the context of a base rate …

Coordination in network security games: a monotone comparative statics approach

M Lelarge - IEEE Journal on Selected Areas in …, 2012 - ieeexplore.ieee.org
Malicious softwares or malwares for short have become a major security threat. While
originating in criminal behavior, their impact are also influenced by the decisions of …

FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage

S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of
business or consumer data, which is often triggered by multi-stage attacks and advanced …

[PDF][PDF] Economics of ransomware attacks

T August, D Dao, MF Niculescu - Available at SSRN, 2019 - weis2016.econinfosec.org
Over the last few years, both the development of ransomware strains as well as changes in
the marketplace for malware have greatly reduced the entry barrier for attackers to conduct …

Economics of ransomware: Risk interdependence and large-scale attacks

T August, D Dao, MF Niculescu - Management Science, 2022 - pubsonline.informs.org
Recently, the development of ransomware strains and changes in the marketplace for
malware have greatly reduced the entry barrier for attackers to conduct large-scale …

Embracing risk dependency in designing cyber-insurance contracts

MM Khalili, P Naghizadeh, M Liu - 2017 55th Annual Allerton …, 2017 - ieeexplore.ieee.org
We study the problem of designing cyber insurance policies in an interdependent network,
where the loss of one agent (a primary party) depends not only on his own effort, but also on …

Designing cyber insurance policies in the presence of security interdependence

MM Khalili, P Naghizadeh, M Liu - Proceedings of the 12th workshop on …, 2017 - dl.acm.org
Cyber insurance is a method for risk transfer but may or may not improve the state of network
security. In this work, we consider a profit-maximizing insurer with voluntarily participating …

Interdependent defense games: Modeling interdependent security under deliberate attacks

H Chan, M Ceyko, LE Ortiz - arXiv preprint arXiv:1210.4838, 2012 - arxiv.org
We propose interdependent defense (IDD) games, a computational game-theoretic
framework to study aspects of the interdependence of risk and security in multi-agent …