2020
DOI: 10.1016/j.insmatheco.2020.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic structural percolation model of loss distribution for cyber risk of small and medium-sized enterprises for tree-based LAN topology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

3
44
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(48 citation statements)
references
References 13 publications
3
44
0
1
Order By: Relevance
“…Under the assumption of a tree-based local area network (LAN) topology, Jevti and Lanchier [ 17 ] present a structural model of aggregate cyber loss distribution for small- and medium-sized businesses. Hua and Xu [ 18 ] proposed a risk-spreading and recovering algorithm for generating synthetic data.…”
Section: Introductionmentioning
confidence: 99%
“…Under the assumption of a tree-based local area network (LAN) topology, Jevti and Lanchier [ 17 ] present a structural model of aggregate cyber loss distribution for small- and medium-sized businesses. Hua and Xu [ 18 ] proposed a risk-spreading and recovering algorithm for generating synthetic data.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, the first moment of the size of the percolation clusters on finite graphs is closely related to the notion of network resilience in computer network theory [7]. Similarly, the modeling framework introduced by [5] shows that, in the context of cyber security, both the first and the second moments of the cluster size are keys to computing insurance premiums. Motivated by these aspects, [6] studied the first and second moments of the cluster size on elementary graphs: the path, the ring and the star.…”
Section: Introductionmentioning
confidence: 99%
“…According to The Institute of Risk Management, cyber risk is "any risk of financial loss, disruption or damage to the reputation of an organization from some sort of failure of its information technology systems" [18]. Following [10], we define cyber risk due to a data breach as "the risk of a financial loss caused by a breach of an institution's IT infrastructure by unauthorized parties, resulting in exploitation, taking possession of, or disclosure of data assets". Cyber risk has attracted considerable attention within the past years due to the rapidly growing number of cyber attacks [22].…”
Section: Introductionmentioning
confidence: 99%
“…Antonio and Indratno (2021) also used an epidemic model on regular networks to simulate the process of a virus spreading and calculating the total loss [4]. However, none of these models fully utilize the aspect of cyber resilience, which is very much connected with bond percolation [10,11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation