security_economics
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| security_economics [2017/06/26 10:41] – [Publications] stanislav.dashevskyi@unitn.it | security_economics [2021/01/29 10:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| + | * On the fairness of seucirty taxes in presence on interdependence | ||
| + | * Estimating quantitative likelihood | ||
| * Cyber-Insurance: | * Cyber-Insurance: | ||
| - | * The Work Averse Attacker Model | + | * The Work Averse Attacker Model (A different way to consider attackers) |
| * Black markets actually work! | * Black markets actually work! | ||
| * Risk vs Rule base regulation: what is the best way to regulate? | * Risk vs Rule base regulation: what is the best way to regulate? | ||
| Line 12: | Line 14: | ||
| * Is "more security training" | * Is "more security training" | ||
| - | See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] and [[malware_analysis|Malware Analysis]]. | + | See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] |
| - | ==== Cyber-Insurance: good for your company, bad for your country? ==== | + | ==== |
| - | Our {{: | + | Several definitions of risk exist (probability and impact, uncertainty and expected consequence, |
| - | ' | + | * //Risk = Impact · Likelihood// |
| - | It is a booming market that raises significant expectations: | + | For a company, impact is easy to calculate as data about one's own asset is routinely collected. Likelihood is stillthe holy grail. So, both ISO/ |
| - | FOSS components within a proprietary software supply chain of a large European | + | |
| - | software vendor. | + | |
| - | To this extent | + | In our {{allodi-risa-17.pdf|Risk Analysis paper}} |
| - | company checks each component | + | |
| - | groups), distributed (each product group is in charge | + | This data is currently often used in an unstructured way to either generate automatic reports on vulnerability severity, or to try to traceback known incidents. Our methodology proposes to correlate this data to measure on one side the exposure |
| - | its consumed FOSS components), and hybrid (only the least used components are | + | ==== Cyber-Insurance: |
| - | checked individually by each development team). Our work was motivated by the need to estimate | + | |
| - | FOSS components within | + | Our {{: |
| - | software vendor. | + | |
| - | To this extent we have identified three different cost models: centralized | + | ' |
| - | company checks each component | + | |
| - | groups), distributed (each product group is in charge of evaluating | + | |
| - | its consumed FOSS components), | + | |
| - | checked individually by each development team). ive characteristics | + | |
| In our paper we show a very general model of heterogeneous firms, making risk averse decisions facing losses from cyber attacks conducted by strategic adversaries in a Cournot competition. There are essentially no assumtpions, | In our paper we show a very general model of heterogeneous firms, making risk averse decisions facing losses from cyber attacks conducted by strategic adversaries in a Cournot competition. There are essentially no assumtpions, | ||
| Line 75: | Line 70: | ||
| can be determined by the timing of first appearance of the attack in the WINE database. | can be determined by the timing of first appearance of the attack in the WINE database. | ||
| - | If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{: | + | If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{: |
| + | |||
| + | If you are interested in knowing whether we could use this insight for actual predictions please look at our [[https:// | ||
| + | |||
| + | |||
| + | ==== The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations ==== | ||
| + | |||
| + | Traditionally, | ||
| + | |||
| + | Our observation is that, in a //normal// case, monetary losses come // | ||
| + | * security vulnerability ≠ money loss | ||
| + | However, it is different for // | ||
| + | |||
| + | ^ ^ ^ ^ | ||
| + | | Our first claim, which follows the DAO definition, is that | (A) | code = company| | ||
| + | | And typically organisations are vectors for contracts and financial transactions (Tirole) | (B) | company = monetary transactions| | ||
| + | | Then, from (A) and (B), it follows immediately that | (C) | code = monetary transactions | | ||
| + | | As a result in this case money loss comes // | ||
| + | |||
| + | Then we would certainly wonder //" | ||
| + | |||
| + | In conclusion, for financial technology protocols, we always have to consider this kind of security economics vulnerabilities in which besides preserving the integrity or some other security properties we also need to consider the economics aspect of the application that we are trying to build because, for example, in TheDAO' | ||
| ==== Malware Markets ==== | ==== Malware Markets ==== | ||
| Line 145: | Line 161: | ||
| and mitigation framework) would be subject | and mitigation framework) would be subject | ||
| to a risk-based regulatory framework. | to a risk-based regulatory framework. | ||
| - | |||
| Line 192: | Line 207: | ||
| ===== People ===== | ===== People ===== | ||
| - | The following is a list a people | + | The following is a list a people |
| - | * Luca Allodi (TU Eindhoven) | + | * [[http:// |
| + | * Martina De Gramatica | ||
| * [[http:// | * [[http:// | ||
| - | * Martina De Gramatica\ | + | * [[https:// |
| - | * Woohyun Shim (now at KAP) | + | * [[https:// |
| - | * Julian Williams (Visiting from Durham University) | + | * [[https:// |
| ===== Projects ===== | ===== Projects ===== | ||
| Line 209: | Line 225: | ||
| ===== Publications ===== | ===== Publications ===== | ||
| + | * L. Allodi, F. Massacci. **Security Events and Vulnerability Data for Cyber Security Risk Estimation.** To appear in //Risk Analysis// (Special Issue on Risk Analysis and Big Data), 2017.{{http:// | ||
| + | * F. Massacci, C.N. Ngo, J. Nie, D. Venturi, J. Williams. **The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations**. To appear in //Security Protocols Workshop (SPW)// 2017. {{https:// | ||
| * L. Allodi, F. Massacci, J. Williams. **The Work Averse Attacker Model.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http:// | * L. Allodi, F. Massacci, J. Williams. **The Work Averse Attacker Model.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http:// | ||
| * F. Massacci, J. Williams. **Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Adversaries.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http:// | * F. Massacci, J. Williams. **Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Adversaries.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http:// | ||
| Line 233: | Line 250: | ||
| * Woohyun Shim. Types of Information Vulnerability and IT Security Investment: An Empirical Analysis of Businesses in Korea. Paper presented at the 7th Annual Forum on Financial Information Systems and Cyber Security: A Public Policy Perspective, | * Woohyun Shim. Types of Information Vulnerability and IT Security Investment: An Empirical Analysis of Businesses in Korea. Paper presented at the 7th Annual Forum on Financial Information Systems and Cyber Security: A Public Policy Perspective, | ||
| * Woohyun Shim & Johannes Bauer. How Can Organizations Improve Cyber Security? Implementing Security Controls in the Presence of Moral Hazard. Paper presented at the 18th Biennial Conference of the International Telecommunications, | * Woohyun Shim & Johannes Bauer. How Can Organizations Improve Cyber Security? Implementing Security Controls in the Presence of Moral Hazard. Paper presented at the 18th Biennial Conference of the International Telecommunications, | ||
| - | |||
| - | |||
security_economics.1498466519.txt.gz · Last modified: (external edit)
