Aegis A Novel Cyber-Insurance Model

Size: px
Start display at page:

Download "Aegis A Novel Cyber-Insurance Model"

Transcription

1 Aegis A Novel Cyber-Insurance Model Ranjan Pal Department of Computer Science University of Southern California Joint Work with Leana Golubchik and Kostas Psounis University of Southern California Presentation at IEEE/ACM GameSec 2011, Maryland, USA

2 Introduction(1/2) Traditional Internet was designed under ideal security assumptions only trustworthy users no propagation of malicious elements Today the Internet faces lot of threats denial of service attacks worms, viruses, spams, etc. Traditional security mechanisms to mitigate risks antivirus and anti-spam softwares by Symantec, Kaspersky, etc. firewalls

3 Introduction(2/2) Traditional security mechanisms do not guarantee 100% risk removal new threats evolve rapidly technical solutions are not fool-proof - there may be false positives/negatives [Jung et.al 04] formal solutions find it difficult to account for human intentions [Vojnovic & Ganesh, 05] Network externalities due to lock-in and first mover effects [Anderson, 01, Katz & Shapiro, 85] Technical + Economic + Policy + Psychological factors will play a role in ensuring perfect or near perfect security [Anderson & Moore, 08] Cyber-insurance is a technique proposed by researchers to eliminate risks completely An agency (ISP or a regulatory organization) charges premiums in return for risk coverage Amount of coverage and individual user responsibility drive premiums

4 Motivation (1/2) Cyber-insurance researchers have only considered risks due to security related failures have shown the existence of markets in ideal conditions [Lelarge & Bolot, 09] have shown the non-existence of markets in non-ideal conditions [Shetty et.al, 09] if a market exists cyber-insurance drives user security investments [L&B, 09] eliminates the free-riding problem amongst users increases overall network security Risks also arise due to non-security related failures, ex., reliability losses [Honeyman and Schwarz, 07] security and non-security related failures indistinguishable to naive users BUT might be distinguishable by experts insurance company would only want to insure for security lapses

5 Motivation(2/2) Naive users at disadvantage w.r.t buying insurance contracts user may not be in favor of buying cyber-insurance may not be willing to transfer complete liability to insurer Interesting questions to consider could we have a different type of cyber-insurance contract? how will it perform in a market along with traditional cyber-insurance? how would demand for this type of cyber-insurance scale with premiums? would markets for cyber-insurance exist under the new type of insurance? can we comment on the deployability of insurance in relation to market existence?

6 Contributions We propose a novel model of cyber-insurance - Aegis based on the concept of co-insurance in traditional insurance theory user is responsible for a strictly positive amount loss recovery liability Aegis suited to the combined presence of insurable and non-insurable risks Risk-averse users always prefer Aegis to traditional cyber-insurance Any type of insurance is purchased only if purchase is made mandatory Premium-demand trends in Aegis increase in premium may not lead to decrease in demand decrease in premium may not lead to increase in demand

7 Aegis Model(1/4) Risks arise due to security or non-security related issues security related - worms, viruses, spams, etc., non-security related - hardware faults, operational/programming errors effects same in case of security or non-security related failure, (ex., case of buffer overflow) Users rest a strictly positive loss recovery coverage on themselves θ - cyber-insurer liability 1 θ - user liability Value of loss incurred by Internet user - L ; Coverage - L d, d 0

8 Aegis Model(2/4) Final wealth (W) of an Internet user is represented as follows W = w 0 + v L S L NS + θ(i(l S ) P ) W - random variable w 0 + v - constant initial wealth, v - constant total value of loss object L S - r.v. denoting loss due to security attack L NS - r.v. denoting loss due to non-security related failure P = (1 + λ)e(i(l s )) - premium λ - loading factor - 0 for fair premiums, positive for unfair premiums I(L S ) - insurance coverage function, 0 I(L S ) L S

9 Aegis Model(3/4) Expected Utility of Final wealth of a user is represented as follows E(W )=A + B + C + D A = B = 0<L S v,l NS =0 0<L NS V,L S =0 u(w 0 + v L S L NS + θ(i(l S ) P )) g(l S,L NS )dl 1 dl NS u(w 0 + v L S L NS + θ(i(l S ) P )) g(l S,L NS )dl S dl NS C = 0<L S,0<L NS u(w 0 + v L S L NS + θ(i(l S ) P )) g(l S,L NS )dl S dl NS D = β u(w 0 + v θ P )

10 Aegis Model(4/4) Joint probability density function g() is given as follows g(l S,L NS )= α f S (L S ) 0 <L S v, L NS =0 (1 α β) f NS (L NS ) 0 <L NS v, L S =0, 0 0 <L S v, 0 <L NS v α - probability of loss due to security attack (function of topology) - probability of no attack β f S (L S )- univariate density function of losses due to security attack f NS (L NS )- univariate density function of losses due to non-security failure

11 Aegis Efficacy (1/3) Result 1 - Risk-averse Internet users always prefer Aegis contracts to traditional cyber-insurance contracts irrespective of the fairness of insurance premiums the option of traditional insurance and Aegis must exist non-insurable losses co-exist with insurable losses Intuitions A risk-averse Internet user would be conservative in his investments He could pay premiums and still not get covered As a result, would assume some coverage liability on himself Advantage - incentive to invest in self-defense mechanisms

12 Aegis Efficacy (2/3) Result 2 - when risks due to non-insurable losses increase in a first-order stochastic dominant sense (FOSD), the demand for traditional cyber-insurance amongst all riskaverse Internet users decreases non-insurable losses co-exist with insurable losses Intuitions greater chances user incurs a loss and not get covered increase in risks due to non-insurable losses decreases demand for Aegis contracts as well However, Aegis preferred to traditional insurance for same amount of risk

13 Aegis Efficacy (3/3) Result 3 - when risks due to non-insurable losses increase in a first-order stochastic dominant sense (FOSD), the expected utility of final wealth for any non-insurable contract falls with respect when compared to the alternative of no insurance non-insurable losses co-exist with insurable losses Implication risk-averse Internet users may not buy any form of insurance if purchasing insurance not made mandatory Thus markets for cyber-insurance may not exist even if information asymmetry problems do not arise, i.e., under ideal conditions Learning - ISPs or policy agencies like the government should make insurance purchase mandatory

14 Sensitivity Analysis (1/4) We study the increase/decrease in user insurance demands with changes in the premiums, and accounting for risk-averseness Analysis Assumptions User utility function U twice continuously differentiable U is thrice piecewise continuously differentiable U > 0 and U < 0 Coefficient of risk aversion, A, bounded by above We adopt the standard Arrow-Pratt risk aversion measure - absolute & relative A(W )= U (W ) U (W ) R(W )= WU (W ) U (W )

15 Sensitivity Analysis (2/4) Given that Internet users are risk-averse in an absolute sense, we need dθ to investigate the sign of the quantity,where λ = (1 + λ) and θ is dλ the optimal coverage liability on user. dθ dλ 0 if there exists ρɛr such that w L [A(W (x))θ (x λ E(L)) 1]dF (x) ρ w L θ (x λ E(L))dF (x) dθ dλ 0 if there exists ρɛr such that w L [A(W (x))θ (x λ E(L)) 1]dF (x) < ρ w L θ (x λ E(L))dF (x)

16 Sensitivity Analysis (3/4) Under what conditions would a ρ exist?? when (i) (1 θ )A A θ A (ii) w 0 A(W (L)) and { L λ E(L) } 1 θ A(W (L)) df (L) > 0

17 Sensitivity Analysis (4/4) Given that Internet users are risk-averse in an relative sense, we need to investigate the sign of the quantity dθ,where λ = (1 + λ) and θ is the optimal coverage liability on user. dλ dθ dλ 0 if and only if dθ if and only if R(W ) 1 dλ 0 R(W ) > 1 Implications - a user prefers Aegis contracts above a certain degree of relative risk-averseness even if there is an increase in premiums Intuitions relative risk aversion measured w.r.t. wealth of a user, more his wealth, lesser are his concerns on losing money paying for premiums and not getting insured, and vice-versa

18 Conclusion We proposed Aegis, a novel cyber-insurance model to account for noninsurable losses in addition to insurable losses We showed Aegis is always preferable to traditional cyber-insurance We showed that Aegis incentivizes users to invest more in self-defense and thereby increase overall network security We showed cyber-insurance markets exist ONLY if buying insurance is made mandatory Regarding demands for Aegis, we showed that an increase in the premiums may not lead to a decrease in user demand, and similarly a decrease in the premiums may not lead to an increase in the insurance premiums

19 Thank You!!!

Aegis A Novel Cyber-Insurance Model

Aegis A Novel Cyber-Insurance Model Aegis A Novel Cyber-Insurance Model Ranjan Pal, eana Golubchik, Konstantinos Psounis University of Southern California, USA {rpal, leana, kpsounis}@usc.edu Abstract. Recent works on Internet risk management

More information

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Modeling Internet Security Investments Tackling Topological Information Uncertainty Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom

More information

Will Cyber-Insurance Improve Network Security? A Market Analysis

Will Cyber-Insurance Improve Network Security? A Market Analysis Will Cyber- Improve Network Security? A Market Analysis Ranjan Pal University of Southern California Email: rpal@usc.edu Leana Golubchik and Konstantis Psounis University of Southern California Email:

More information

IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE. Ranjan Pal

IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE. Ranjan Pal IMPROVING NETWORK SECURITY THROUGH CYBER-INSURANCE by Ranjan Pal A Dissertation Presented to the FACULTY OF THE USC GRADUATE SCHOOL UNIVERSITY OF SOUTHERN CALIFORNIA In Partial Fulfillment of the Requirements

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets

Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets Improving Network Security Through Insurance A Tale of Cyber-Insurance Markets Ranjan Pal Department of Computer Science University of Southern California PhD Advisors - Leana Golubchik and Konstantinos

More information

How To Analyze Security In A Network Of People

How To Analyze Security In A Network Of People Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal 1 and Pan Hui 2 1 University of Southern California, USA, rpal@usc.edu 2 Deutsch Telekom Laboratories, Berlin,

More information

Using Insurance to Increase Internet Security

Using Insurance to Increase Internet Security Using Insurance to Increase Internet Security Svetlana Radosavac, James Kempf and Ulaş C. Kozat DoCoMo Communications Laboratories US, Inc. Palo lto, C 94304 {sradosavac,kempf,kozat}@docomolabs-usa.com

More information

Explaining Insurance Policy Provisions via Adverse Selection

Explaining Insurance Policy Provisions via Adverse Selection The Geneva Papers on Risk and Insurance Theory, 22: 121 134 (1997) c 1997 The Geneva Association Explaining Insurance Policy Provisions via Adverse Selection VIRGINIA R. YOUNG AND MARK J. BROWNE School

More information

Modeling Internet Security Investments

Modeling Internet Security Investments Modeling Internet Security Investments 1 The Case of Dealing with Information Uncertainty Ranjan Pal and Pan Hui University of Southern California, Deutsch Telekom Laboratories arxiv:1104.0594v1 [cs.cr]

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui Computer Science & Engineering Department The Chinese University of Hong Kong Abstract.

More information

Adverse Selection and the Market for Health Insurance in the U.S. James Marton

Adverse Selection and the Market for Health Insurance in the U.S. James Marton Preliminary and Incomplete Please do not Quote Adverse Selection and the Market for Health Insurance in the U.S. James Marton Washington University, Department of Economics Date: 4/24/01 Abstract Several

More information

Cyber Insurance as an Incentive for Internet Security

Cyber Insurance as an Incentive for Internet Security Cyber Insurance as an Incentive for Internet Security Jean Bolot Sprint, California, USA bolot@sprint.com Marc Lelarge INRIA-ENS, Paris, France marc.lelarge@ens.fr Abstract Managing security risks in the

More information

Choice under Uncertainty

Choice under Uncertainty Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory

More information

On Prevention and Control of an Uncertain Biological Invasion H

On Prevention and Control of an Uncertain Biological Invasion H On Prevention and Control of an Uncertain Biological Invasion H by Lars J. Olson Dept. of Agricultural and Resource Economics University of Maryland, College Park, MD 20742, USA and Santanu Roy Department

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

Regret and Rejoicing Effects on Mixed Insurance *

Regret and Rejoicing Effects on Mixed Insurance * Regret and Rejoicing Effects on Mixed Insurance * Yoichiro Fujii, Osaka Sangyo University Mahito Okura, Doshisha Women s College of Liberal Arts Yusuke Osaki, Osaka Sangyo University + Abstract This papers

More information

Lecture 13: Risk Aversion and Expected Utility

Lecture 13: Risk Aversion and Expected Utility Lecture 13: Risk Aversion and Expected Utility Uncertainty over monetary outcomes Let x denote a monetary outcome. C is a subset of the real line, i.e. [a, b]. A lottery L is a cumulative distribution

More information

The Impact of Interlinked Insurance and Credit Contracts on Financial Market Deepening and Small Farm Productivity

The Impact of Interlinked Insurance and Credit Contracts on Financial Market Deepening and Small Farm Productivity The Impact of Interlinked Insurance and Credit Contracts on Financial Market Deepening and Small Farm Productivity June 2011 Summary Twin puzzles Ample evidence that uninsured risk depresses small holder

More information

Economics of Information Security - A Review

Economics of Information Security - A Review Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu Information

More information

Optimal Reinsurance Arrangements Under Tail Risk Measures

Optimal Reinsurance Arrangements Under Tail Risk Measures Optimal Reinsurance Arrangements Under Tail Risk Measures Carole Bernard, and Weidong Tian 6th March 2007 Abstract Regulatory authorities demand insurance companies to control the risks by imposing stringent

More information

2. Information Economics

2. Information Economics 2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many

More information

Demand and supply of health insurance. Folland et al Chapter 8

Demand and supply of health insurance. Folland et al Chapter 8 Demand and supply of health Folland et al Chapter 8 Chris Auld Economics 317 February 9, 2011 What is insurance? From an individual s perspective, insurance transfers wealth from good states of the world

More information

WHY THE LONG TERM REDUCES THE RISK OF INVESTING IN SHARES. A D Wilkie, United Kingdom. Summary and Conclusions

WHY THE LONG TERM REDUCES THE RISK OF INVESTING IN SHARES. A D Wilkie, United Kingdom. Summary and Conclusions WHY THE LONG TERM REDUCES THE RISK OF INVESTING IN SHARES A D Wilkie, United Kingdom Summary and Conclusions The question of whether a risk averse investor might be the more willing to hold shares rather

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

The gain from insurance (full information)

The gain from insurance (full information) The gain from insurance (full information) W 2 U U 1 E W W 2 W 45 W c E(W ) W 1 W 1 Figure 1: Demand for insurance Risk aversion: u (EW ) >Eu(W ), Risk averse individuals dislike uncertainty Assumptions:

More information

Lecture notes for Choice Under Uncertainty

Lecture notes for Choice Under Uncertainty Lecture notes for Choice Under Uncertainty 1. Introduction In this lecture we examine the theory of decision-making under uncertainty and its application to the demand for insurance. The undergraduate

More information

Economic Incentives to Increase Security in the Internet: The Case for Insurance

Economic Incentives to Increase Security in the Internet: The Case for Insurance Economic Incentives to Increase Security in the Internet: The Case for Insurance Marc Lelarge INRIA-ENS France Email: marc.lelarge@ens.fr Jean Bolot SPRINT USA Email: bolot@sprint.com Abstract Entities

More information

EDUCATION AND EXAMINATION COMMITTEE SOCIETY OF ACTUARIES RISK AND INSURANCE. Copyright 2005 by the Society of Actuaries

EDUCATION AND EXAMINATION COMMITTEE SOCIETY OF ACTUARIES RISK AND INSURANCE. Copyright 2005 by the Society of Actuaries EDUCATION AND EXAMINATION COMMITTEE OF THE SOCIET OF ACTUARIES RISK AND INSURANCE by Judy Feldman Anderson, FSA and Robert L. Brown, FSA Copyright 25 by the Society of Actuaries The Education and Examination

More information

Email security Cloud vs. On-premise solutions

Email security Cloud vs. On-premise solutions GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents

More information

Attack and defense. 2nd ATE Symposium University of New South Wales Business School December, 2014

Attack and defense. 2nd ATE Symposium University of New South Wales Business School December, 2014 Attack and defense Simona Fabrizi 1 Steffen Lippert 2 José Rodrigues-Neto 3 1 Massey University 2 University of Auckland 3 Australian National University 2nd ATE Symposium University of New South Wales

More information

Bank s Assets and Liabilities Management With multiple Sources of Risk. Thilo Pausch

Bank s Assets and Liabilities Management With multiple Sources of Risk. Thilo Pausch Bank s Assets and Liabilities Management With multiple Sources of Risk Thilo Pausch Beitrag Nr. 245, Juli 2003 Bank s Assets and Liabilities Management with multiple Sources of Risk Thilo Pausch University

More information

Liability Insurance as Protection Against Legal Error. Vickie Bajtelsmit Colorado State University. and

Liability Insurance as Protection Against Legal Error. Vickie Bajtelsmit Colorado State University. and lipale.v2a 07-17-08 Liability Insurance as Protection Against Legal Error Vickie Bajtelsmit Colorado State University and Paul D. Thistle * University of Nevada Las Vegas Thistle s research was supported

More information

Role of Network Topology in Cybersecurity

Role of Network Topology in Cybersecurity Role of Network Topology in Cybersecurity Richard J. La Abstract We study how an underlying network property affects network security when nodes are rational and have four choices i) invest in protection,

More information

A progressive and integrated approach to protecting corporate networks

A progressive and integrated approach to protecting corporate networks A progressive and integrated approach to protecting corporate networks Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

A Portfolio Model of Insurance Demand. April 2005. Kalamazoo, MI 49008 East Lansing, MI 48824

A Portfolio Model of Insurance Demand. April 2005. Kalamazoo, MI 49008 East Lansing, MI 48824 A Portfolio Model of Insurance Demand April 2005 Donald J. Meyer Jack Meyer Department of Economics Department of Economics Western Michigan University Michigan State University Kalamazoo, MI 49008 East

More information

Patent Litigation with Endogenous Disputes

Patent Litigation with Endogenous Disputes Patent itigation with Endogenous Disputes Presentation at the AEA Annual Meeting January 6, 006 Session: Intellectual Property, itigation, and Innovation By James Bessen and Michael J. Meurer James Bessen

More information

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure Real-time protection backed by the largest investment in security infrastructure Overview delivers inbound and outbound messaging security, with effective and accurate real-time antispam and antivirus

More information

Economics 206 Problem Set 1 Winter 2007 Vincent Crawford

Economics 206 Problem Set 1 Winter 2007 Vincent Crawford Economics 206 Problem Set 1 Winter 2007 Vincent Crawford This problem set, which is optional, covers the material in the first half of the course, roughly in the order in which topics are discussed in

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare. Comparative Analysis

Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare. Comparative Analysis Kaspersky Internet Security 6.0 vs Microsoft Windows Live OneCare Table of Contents 1 A brief overview of functionality...3 2 General information...4 3 Installation on infected PC and treatment of active

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Problem Set 9 s 1. A monopoly insurance company provides accident insurance to two types of customers: low risk customers, for whom the probability of an accident is 0.25, and high risk customers, for

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

XII. RISK-SPREADING VIA FINANCIAL INTERMEDIATION: LIFE INSURANCE

XII. RISK-SPREADING VIA FINANCIAL INTERMEDIATION: LIFE INSURANCE XII. RIS-SPREADIG VIA FIACIAL ITERMEDIATIO: LIFE ISURACE As discussed briefly at the end of Section V, financial assets can be traded directly in the capital markets or indirectly through financial intermediaries.

More information

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity World-class security solutions for your business Kaspersky Open Open Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile devices

More information

Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model

Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model Lecture notes on Moral Hazard, i.e. the Hidden Action Principle-Agent Model Allan Collard-Wexler April 19, 2012 Co-Written with John Asker and Vasiliki Skreta 1 Reading for next week: Make Versus Buy in

More information

Bayesian logistic betting strategy against probability forecasting. Akimichi Takemura, Univ. Tokyo. November 12, 2012

Bayesian logistic betting strategy against probability forecasting. Akimichi Takemura, Univ. Tokyo. November 12, 2012 Bayesian logistic betting strategy against probability forecasting Akimichi Takemura, Univ. Tokyo (joint with Masayuki Kumon, Jing Li and Kei Takeuchi) November 12, 2012 arxiv:1204.3496. To appear in Stochastic

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses White Paper How to Effectively Provide Safe and Productive Web Environment for Today's Businesses Table of Content The Importance of Safe and Productive Web Environment... 1 The dangers of unrestricted

More information

Pearson's Correlation Tests

Pearson's Correlation Tests Chapter 800 Pearson's Correlation Tests Introduction The correlation coefficient, ρ (rho), is a popular statistic for describing the strength of the relationship between two variables. The correlation

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

Financial Market Microstructure Theory

Financial Market Microstructure Theory The Microstructure of Financial Markets, de Jong and Rindi (2009) Financial Market Microstructure Theory Based on de Jong and Rindi, Chapters 2 5 Frank de Jong Tilburg University 1 Determinants of the

More information

arxiv:astro-ph/9803004v2 3 Mar 1998

arxiv:astro-ph/9803004v2 3 Mar 1998 Observation of Gravitational Lensing in the Clumpy Universe Hideki ASADA 1 Yukawa Institute for Theoretical Physics Kyoto University, Kyoto 606-01, Japan email: asada@yukawa.kyoto-u.ac.jp arxiv:astro-ph/9803004v2

More information

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market

Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Security Adoption in Heterogeneous Networks: the Influence of Cyber-insurance Market Zichao Yang and John C.S. Lui The Chinese University of Hong Kong {zcyang,cslui}@cse.cuhk.edu.hk Abstract. Hosts (or

More information

Portfolio Allocation and Asset Demand with Mean-Variance Preferences

Portfolio Allocation and Asset Demand with Mean-Variance Preferences Portfolio Allocation and Asset Demand with Mean-Variance Preferences Thomas Eichner a and Andreas Wagener b a) Department of Economics, University of Bielefeld, Universitätsstr. 25, 33615 Bielefeld, Germany.

More information

Supplement to Call Centers with Delay Information: Models and Insights

Supplement to Call Centers with Delay Information: Models and Insights Supplement to Call Centers with Delay Information: Models and Insights Oualid Jouini 1 Zeynep Akşin 2 Yves Dallery 1 1 Laboratoire Genie Industriel, Ecole Centrale Paris, Grande Voie des Vignes, 92290

More information

How to assess the risk of a large portfolio? How to estimate a large covariance matrix?

How to assess the risk of a large portfolio? How to estimate a large covariance matrix? Chapter 3 Sparse Portfolio Allocation This chapter touches some practical aspects of portfolio allocation and risk assessment from a large pool of financial assets (e.g. stocks) How to assess the risk

More information

Research Imperatives

Research Imperatives Research Imperatives Areas of Research Needed in Information Security Julie J.C.H. Ryan, D.Sc. Assistant Professor The George Washington University What We Know Technology Fabulous research going on in

More information

Information Security Recommendation Report

Information Security Recommendation Report Information Security Recommendation Report Prepared for Baker and Company Prepared by Alma Ruiz May 3, 2013 Table of Contents ii Table of Contents Introduction... 1 Methods for Evaluation... 3 Results

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Cisco ASA 5500 Series Content Security Edition for the Enterprise Cisco ASA 5500 Series Content Security Edition for the Enterprise Viruses and other malicious code can overwhelm your IT resources, disrupting business operations and impacting business transactions. The

More information

A progressive and integrated approach to protecting corporate networks

A progressive and integrated approach to protecting corporate networks A progressive and integrated approach to protecting corporate networks Kaspersky Open Space Security is a suite of products that offers security coverage for all types of network endpoints, from mobile

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

On Compulsory Per-Claim Deductibles in Automobile Insurance

On Compulsory Per-Claim Deductibles in Automobile Insurance The Geneva Papers on Risk and Insurance Theory, 28: 25 32, 2003 c 2003 The Geneva Association On Compulsory Per-Claim Deductibles in Automobile Insurance CHU-SHIU LI Department of Economics, Feng Chia

More information

Outsourced Security Trends in Messaging April 2005

Outsourced Security Trends in Messaging April 2005 April 2005 205 Hudson Street, Floor 7 New York, NY 10013 212.620.2845 P 212.219.1660 F www.omnipod.com 2005 All Rights Reserved. Enterprises need a reliable, efficient way to secure their messaging infrastructure

More information

International Stock Market Integration: A Dynamic General Equilibrium Approach

International Stock Market Integration: A Dynamic General Equilibrium Approach International Stock Market Integration: A Dynamic General Equilibrium Approach Harjoat S. Bhamra London Business School 2003 Outline of talk 1 Introduction......................... 1 2 Economy...........................

More information

SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT

SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT CHAPTER 8 SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT In YM, one of the major problems in maximizing revenue is the number of cancellations. In industries implementing YM this is very

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

Genetic Testing, Insurance Underwriting and Adverse Selection

Genetic Testing, Insurance Underwriting and Adverse Selection Genetic Testing, Insurance Underwriting and Adverse Selection Pradip Tapadar University of Kent Global Conference of Actuaries, Mumbai, India 19-21 February, 2012 P Tapadar (University of Kent) Genetics

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

Competitive Cyber-Insurance and Internet Security

Competitive Cyber-Insurance and Internet Security Competitive Cyber-Insurance and Internet Security Nikhil Shetty Galina Schwartz Mark Felegyhazi Jean Walrand {nikhils@eecs, schwartz@eecs, mark@icsi, wlr@eecs}.berkeley.edu Abstract This paper investigates

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Institute for Empirical Research in Economics University of Zurich. Working Paper Series ISSN 1424-0459. Working Paper No. 229

Institute for Empirical Research in Economics University of Zurich. Working Paper Series ISSN 1424-0459. Working Paper No. 229 Institute for Empirical Research in Economics University of Zurich Working Paper Series ISSN 1424-0459 Working Paper No. 229 On the Notion of the First Best in Standard Hidden Action Problems Christian

More information

Enterprise Buyer Guide

Enterprise Buyer Guide Enterprise Buyer Guide Umbrella s Secure Cloud Gateway vs. Web Proxies or Firewall Filters Evaluating usability, performance and efficacy to ensure that IT teams and end users will be happy. Lightweight

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Equilibria and Dynamics of. Supply Chain Network Competition with Information Asymmetry. and Minimum Quality Standards

Equilibria and Dynamics of. Supply Chain Network Competition with Information Asymmetry. and Minimum Quality Standards Equilibria and Dynamics of Supply Chain Network Competition with Information Asymmetry in Quality and Minimum Quality Standards Anna Nagurney John F. Smith Memorial Professor and Dong (Michelle) Li Doctoral

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Managing the Adoption of Asymmetric Bidirectional Firewalls: Seeding and Mandating

Managing the Adoption of Asymmetric Bidirectional Firewalls: Seeding and Mandating Managing the Adoption of Asymmetric Bidirectional Firewalls: Seeding and Mandating MHR. Khouzani The Ohio State University, ECE khouzani@ece.osu.edu Soumya Sen Princeton University, EE soumyas@princeton.edu

More information

Voluntary Participation in Cyber-insurance Markets

Voluntary Participation in Cyber-insurance Markets Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive

More information

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES

Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES Unified Security Anywhere SOX COMPLIANCE ACHIEVING SOX COMPLIANCE WITH MASERGY SECURITY PROFESSIONAL SERVICES SOX COMPLIANCE Achieving SOX Compliance with Professional Services The Sarbanes-Oxley (SOX)

More information

Properties of Future Lifetime Distributions and Estimation

Properties of Future Lifetime Distributions and Estimation Properties of Future Lifetime Distributions and Estimation Harmanpreet Singh Kapoor and Kanchan Jain Abstract Distributional properties of continuous future lifetime of an individual aged x have been studied.

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

How To Choose A Dell Sonicwall Firewall From Awna.Com

How To Choose A Dell Sonicwall Firewall From Awna.Com 2014 BUYING GUIDE: DELL SONICWALL FIREWALLS Compliments of Firewalls.com. Your Source for Dell SonicWALL firewalls and professional services. A first-time buyer s guide to understanding which firewall

More information

How To Protect Your Endpoints From Attack

How To Protect Your Endpoints From Attack 2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations

More information

Chapter 16, Part C Investment Portfolio. Risk is often measured by variance. For the binary gamble L= [, z z;1/2,1/2], recall that expected value is

Chapter 16, Part C Investment Portfolio. Risk is often measured by variance. For the binary gamble L= [, z z;1/2,1/2], recall that expected value is Chapter 16, Part C Investment Portfolio Risk is often measured b variance. For the binar gamble L= [, z z;1/,1/], recall that epected value is 1 1 Ez = z + ( z ) = 0. For this binar gamble, z represents

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security

IT@Intel. Measuring the Return on IT Security Investments. White Paper Intel Information Technology Computer Manufacturing Information Security White Paper Intel Information Technology Computer Manufacturing Information Security Measuring the Return on IT Security Investments Intel IT developed a model for measuring return on security investment

More information

White Paper. ZyWALL USG Trade-In Program

White Paper. ZyWALL USG Trade-In Program White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,

More information

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Alex Edmans LBS, NBER, CEPR, and ECGI Itay Goldstein Wharton Wei Jiang Columbia May 8, 05 A Proofs of Propositions and

More information

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania Financial Markets Itay Goldstein Wharton School, University of Pennsylvania 1 Trading and Price Formation This line of the literature analyzes the formation of prices in financial markets in a setting

More information

Pricing in a Competitive Market with a Common Network Resource

Pricing in a Competitive Market with a Common Network Resource Pricing in a Competitive Market with a Common Network Resource Daniel McFadden Department of Economics, University of California, Berkeley April 8, 2002 I. This note is concerned with the economics of

More information

Maximum Likelihood Estimation

Maximum Likelihood Estimation Math 541: Statistical Theory II Lecturer: Songfeng Zheng Maximum Likelihood Estimation 1 Maximum Likelihood Estimation Maximum likelihood is a relatively simple method of constructing an estimator for

More information

Cyril Onwubiko Networking and Communications Group http://ncg. ncg.kingston.ac.

Cyril Onwubiko Networking and Communications Group http://ncg. ncg.kingston.ac. Cyril Onwubiko Networking and Communications Group http://ncg ncg.kingston.ac..ac.uk http://ncg.kingston.ac.uk +44 (0)20 8547 2000 Security Threats & Vulnerabilities in assets are two most fundamental

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information