27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Mecealus Cronkrite et al.<br />

socially efficient level of cyber security which is greater than the private level The graph in Figure 2,<br />

shows the public’s demand for security is greater than individual firms.<br />

Figure 2: Demand vs. Investment in cyber security<br />

4.4 Mitigation: Create information systems cyber security insurance market<br />

Data breeches usually have no consequences or fines for the company that lost the customer data,<br />

and even fewer for the development team that wrote the software or configured the servers. A cyber<br />

security insurance market can create an economic incentive for firms to implement better security<br />

standards. To establish the market governments would have to create laws placing partial liability for<br />

cyber attacks on software publishers and operating firms if they negligent by failing to implement sufficient<br />

security standards and practices. (Baer and Parkinson, 2007:50 – 56)<br />

With better cyber incident, reporting research and insurance communities can find common risky behaviour<br />

patterns. Since private insurance companies use actuary tables and measure risk they would<br />

be able to establish scalable cyber security requirements. In exchange for coverage and premium<br />

discounts, insurance companies can require private firms to take reasonable steps to protect their<br />

systems, within a risk management system. Premiums can assign a higher risk to IT security<br />

breaches stemming from programming errors and failure to adopt best practice standards in cyber<br />

security.<br />

Market forces will generate an insurance market that accommodates different sizes of firms. A major<br />

difficulty regarding this policy implementation is to ensure premiums are not too costly for firms to afford.<br />

As a result, it may be necessary for government to cap the amount of damages that a firm may<br />

pay. The government can help establish the cyber insurance market by facilitating reinsurance<br />

through indemnifying catastrophic losses.<br />

4.5 Mitigation: Compliance in U.S Federal IT acquisition security standards (fines)<br />

Government IT acquisition and procurement decisions are unlike private corporations. In private concerns,<br />

shareholder value should ultimately control spending so the implementation of security is profit<br />

goal driven. The US Federal Government has complex goals for the public good, accountability, fairness,<br />

and transparency. However, the majority of CCI is located within the private sector so to encourage<br />

effective standards government has to rely on market forces and voluntary partnerships with<br />

industry. (Golumbic, 2008)<br />

Governments and (CI) systems increasingly dependent on commercially developed software in doing<br />

so they have transferred security risk upstream to the developers. As a result, the US government has<br />

created many of its own models for secure IT acquisition and procurement that either impact system<br />

development processes. For example, NIST Special Publication 800 series, the DOD standard<br />

DIACAP, and Federal Information Security Management Act (FISMA) all are US regulations to deal<br />

73

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!