Open Access
Issue |
Math. Model. Nat. Phenom.
Volume 17, 2022
|
|
---|---|---|
Article Number | 40 | |
Number of page(s) | 23 | |
DOI | https://doi.org/10.1051/mmnp/2022041 | |
Published online | 14 October 2022 |
- I. Aldasoro, L. Gambacorta, P. Giudici and T. Leach, The drivers of cyber risk (2020). Available at https://www.bbc.com/news/technology-59612917 (accessed 06 December 2021). [Google Scholar]
- Z. Amin, A practical road map for assessing cyber risk. J. Risk Res. 22 (2019) 32–43. [CrossRef] [Google Scholar]
- Y. Antonio and S. Indratno, Cyber insurance rate making based on markov model for regular networks topology. J. Phys. 1752 (2021) 012002. [Google Scholar]
- Australian Cyber Security Centre, Restricting Administrative Privileges (2021). Available at https://www.cyber.gov.au/acsc/view-all-content/publications/restricting-administrative-privileges (accessed 16 December 2021). [Google Scholar]
- R. Betterley, Cyber privacy insurance market survey: a tough market for larger insureds, but smaller insureds finding eager insurers (2016). Available at http://betterley.com/samples/cpims16_nt.pdf (accessed 12 December 2021). [Google Scholar]
- Cybersecurity and Infrastructure Security Agency, Securing network infrastructure devices (2018). Available at https://www.cisa.gov/uscert/ncas/tips/ST18-001 (accessed 12 December 2021). [Google Scholar]
- Cynet, 2022 Survey of CISOs with small cyber security teams (2022). Available at https://go.cynet.com/hubfs/2022%20CISO%20Survey%20of%20Small%20Cyber%20Security%20Teams.pdf (accessed 08 August 2022). [Google Scholar]
- Department of Homeland Security, The increasing threat to network infrastructure devices and recommended mitigations (2016). Available at https://cyber.dhs.gov/assets/report/ar-16-20173.pdf (accessed: 16 November 2021). [Google Scholar]
- Department of Justice: Southern District of New York, California man pleads guilty to hacking websites for the Combating Terrorism Center at West Point and the New York City Comptroller (2018). Available at https://www.justice.gov/usao-sdny/pr/california-man-pleads-guilty-hacking-websites-combating-terrorism-center-west-point-and (accessed: 21 November 2021). [Google Scholar]
- M. Eling and K. Jung, Copula approaches for modeling cross-sectional dependence of data breach losses. Insur. Math. Econ. 82 (2018) 167–180. [CrossRef] [Google Scholar]
- M. Eling, K. Jung and J. Shim, Unraveling heterogeneity in cyber risks using quantile regressions. Insur. Math. Econ. 104 (2022) 222–242. [CrossRef] [Google Scholar]
- M. Eling and J. Wirfs, Modelling and management of cyber risk. Int. Actuar. Assoc. Life Section (2015). [Google Scholar]
- M. Eling and J. Wirfs, What are the actual costs of cyber risk events? Eur. J. Oper. Res. 272 (2019) 1109–1119. [CrossRef] [Google Scholar]
- S. Farkas, O. Lopez and M. Thomas, Cyber claim analysis using generalized Pareto regression trees with applications to insurance. Insur. Math. Econ. 98 (2021) 92–105. [CrossRef] [Google Scholar]
- Federal Bureau of Investigation, Indicators of compromised associated with Diavol (2022). Available at https://www.ic3.gov/Media/News/2022/220120.pdf (accessed: 03 December 2021). [Google Scholar]
- H. Ferraiolo, D.A. Cooper, A.R. Regenscheid, K. Scarfone and M.P. Souppaya, Best practices for privileged user PIV authentication (2016). Available at https://www.nist.gov/publications/best-practices-privileged-user-piv-authentication?pub_id=920826 (accessed 25 August 2021). [Google Scholar]
- P. Georgi, L. Morrow and T. Highfill, Updated and expanded small business statistics: Wages, employment, and gross output by industry and enterprise size, 2012–2017 (2021). Available at https://apps.bea.gov/scb/2021/11-november/pdf/1121-small-business.pdf (accessed 16 December 2021). [Google Scholar]
- H. Herath and T. Herath, Copula-based actuarial model for pricing cyber-insurance policies, Insur. Mark. Compan. 2 (2011) 7–20. [Google Scholar]
- P. Jevtić and N. Lanchier, Dynamic structural percolation model of loss distribution for cyber risk of small and medium-sized enterprises for tree-based LAN topology. Insur. Math. Econ. 91 (2020) 209–223. [CrossRef] [Google Scholar]
- P. Jevtić and N. Lanchier, Systems and methods for a simulation program of a percolation model for the loss distribution caused by a cyber attack. uS Patent No. 11,354,752 (2022). [Google Scholar]
- K. Jung, Extreme data breach losses: an alternative approach to estimating probable maximum loss for data breach risk. North Am. Actuar. J. 25 (2021) 580–603. [CrossRef] [Google Scholar]
- I. Kovačević, S. Groš and A. Derek, Automatically generating models of IT systems. IEEE Access 10 (2022) 13536–13554. [CrossRef] [Google Scholar]
- Marsh, U.K. cyber insurance trends 2020 (2021). Available at https://www.marsh.com/uk/services/cyber-risk/insights/uk-cyber-insurance-trends-2020.html (accessed 16 December 2021). [Google Scholar]
- N. Mhaskar, M. Alabbad and R. Khedri, A formal approach to network segmentation. Comput. Secur. 103 (2021) 102162. [CrossRef] [Google Scholar]
- T.J. Moore and J.-H. Cho, Applying percolation theory, in Cyber Resilience of Systems and Networks Springer (2019), pp. 107–133. [CrossRef] [Google Scholar]
- National Institute of Standards and Technology, Intrusion (2021). Available at https://csrc.nist.gov/glossary/term/intrusion (accessed 16 December 2021). [Google Scholar]
- National Institute of Standards and Technology, Least privilege (2021). Available at https://csrc.nist.gov/glossary/term/least_privilege (accessed 04 December 2021). [Google Scholar]
- National Security Agency, Defend Privileges and Accounts (2019). Available at https://media.defense.gov/2019/Sep/09/2002180330/-1/-1/0/Defend%20Privileges%20and%20Accounts%20-%20Copy.pdf (accessed: 26 August 2021). [Google Scholar]
- National Security Agency, Segment networks and deploy application-aware defenses (2019). Available at https://media.defense.gov/2019/Sep/09/2002180325/-1/-1/0/Segment%20Networks%20and%20Deploy%20Application%20Aware%20Defenses%20-%20Copy.pdf (accessed 09 December 2021). [Google Scholar]
- NetDiligence, Cyber Claims Study (2019). Available at https://dev.networkstandard.com/wp-content/uploads/2020/05/2019_NetD_Claims_Study_Report_L2.pdf (accessed: 10 December 2021). [Google Scholar]
- S. Romanosky, L. Ablon, A. Kuehn and T. Jones, Content analysis of cyber insurance policies: how do carriers price cyber risk? J. Cybersecur. 5 (2019) 1–19. [CrossRef] [Google Scholar]
- SonicWall, Mid-Year Update: SonicWall Cyber Threat Report (2021). Available at https://www.sonicwall.com/2021-cyber-threat-report/ (accessed 18 December 2021). [Google Scholar]
- The Institute of Risk Management, Cyber risk and risk management (2018). Available at https://www.theirm.org/what-we-say/thought-leadership/cyber-risk/ (accessed 11 December 2021). [Google Scholar]
- U.S. Government Accountability Office, Cyber Insurance: insurers and policyholders face challenges in an evolving market (2021). Available at https://www.gao.gov/products/gao-21-477 (accessed 14 December 2021). [Google Scholar]
- U.S. Securities and Exchange Commission, IT specialist settles charges of insider trading on hacked nonpublic information (2016). Available at https://www.sec.gov/news/pressrelease/2016-256.html (accessed 04 December 2021). [Google Scholar]
- U.S. Small Business Administration, Table of small business size standards matched to North American industry classification system codes (2019). Available at https://www.sba.gov/sites/default/files/2019-08/SBA%20Table%20of%20Size%20Standards_Effective%20Aug%2019%2C%202019_Rev.pdf (accessed: 03 December 2021). [Google Scholar]
- Verizon, 2018 Verizon Data Breach Investigations Report (2018). Available at https://www.verizon.com/business/resources/reports/dbir/ (accessed 16 December 2021). [Google Scholar]
- Verizon, 2021 Verizon Data Breach Investigations Report (2021). Available at https://www.verizon.com/business/resources/reports/dbir/ (accessed 15 December 2021). [Google Scholar]
- N. Wagner, C.Ş. Şahin, M. Winterrose, J. Riordan, J. Pena, D. Hanson and W.W. Streilein, Towards automated cyber decision support: a case study on network segmentation for security, in 2016 IEEE Symposium Series on Computational Intelligence. IEEE (2016) 1–10. [Google Scholar]
- H. Wang, Z. Chen, J. Zhao, X. Di and D. Liu, A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow. IEEE Access 6 (2018) 8599–8609. [CrossRef] [Google Scholar]
- S. Wang, Z. Zhang and Y. Kadobayashi, Exploring attack graph for cost-benefit security hardening: a probabilistic approach. Comput. Secur. 32 (2013) 158–169. [CrossRef] [Google Scholar]
- World Economic Forum, Global cybersecurity outlook 2022 (2022). Available at https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf (accessed 16 August 2022). [Google Scholar]
- X. Xie, C. Lee and M. Eling, Cyber insurance offering and performance: an analysis of the U.S. cyber insurance market. Geneva Papers on Risk and Insurance- Issues and Practice 45 (2020) 690–736. [CrossRef] [Google Scholar]
- M. Xu and L. Hua, Cybersecurity insurance: modeling and pricing. North Am. Actuar. J. 23 (2019) 220–249. [CrossRef] [MathSciNet] [Google Scholar]
- P. Żebrowski, A. Couce-Vieira and A. Mancuso, A Bayesian framework for the analysis and optimal mitigation of cyber threats to cyber-physical systems. Risk Anal (2022). https://doi.org/10.1111/risa.13900 [Google Scholar]
- G. Zeller and M. Scherer, A comprehensive model for cyber risk based on marked point processes and its application to insurance. Eur. Actuar. J. 12 (2022) 33–85. [CrossRef] [MathSciNet] [Google Scholar]
- X. Zhang, M. Xu, J. Su and P. Zhao, Structural models for fog computing based internet of things architectures with insurance and risk management applications. Eur. J. Oper. Res. (2022). https://doi.org/10.1016/j.ejor.2022.07.033 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.