Cyber Risk
Cyber Risk
Cyber Risk
1
ACKNOWLEDGE
MENT
I would like to take the opportunity to express my sincere gratitude to
all those who have contributed greatly towards the successful
completion of this dissertation.
Last but not least I would like to thank my friends for listening to me
and encouraging me all through the dissertation.
2
EXECUTIVE SUMMARY
The legal structure required for dealing with cyber crime and cyber
insurance is non existent or poorly defined. Traditional legal systems
have had great difficulty in keeping pace with the rapid growth of the
Internet and its impact throughout the world. While some laws and
objectives have been enacted and a few cases have been decided that
affects the Internet, they leave most of the difficult legal issues to the
3
future. In India, cyber laws are contained in the Information
Technology, Act 2000. In May 2000, both the houses of Indian
Parliament passed the Information Technology Bill. The Bill received
the assent of the President of India in August 2000 (IT Act 2000). The
IT Act 2000 aims to provide the legal infrastructure for e-commerce in
India. At this juncture, it is relevant to understand what the IT Act,
2000 offers and its various perspectives for understanding its
implication on cyber insurance.
There are few insurance providers for cyber risks and the pricing is on
the higher side. There is no past actuarial data to find any kind of
pattern and price products accordingly.
Despite the challenges that come with every new insurance line, cyber
insurance is slowly growing in demand. As companies become more
acclimated to the e-business arena and as their exposure increases,
"cyber insurance will finally make it to the boardroom level of
discussion”.
4
METHODOLOGY
CYBERINSURANCE IN IT SECURITY MANAGEMENT
APPROACH
DATA COLLECTION
Data is collected from various IT companies, banks, insurance
companies etc
Some are given below:-
• MICROSOFT
• AVIVA LIFE INSUARNCE
• RELIANCE MONEY
• ICICI PRUDENTIAL LIFE INSURSNCE
• INTERGLOBE TECHNOLOGIES
5
DATA SOURCES
Primary data sources
The data was collected in the following ways:
6
INTRODUCTION
Institutions today operate in a global, networked economy. Networked
computing is now firmly embedded in virtually every business process.
Providing a secure and trusted platform for conducting transactions
and exchanging information is basic to the value proposition of every
institution. The platform, however, is only partly based at the
institutions’ physical locations. It has expanded to include a distributed
computing system that enables e-commerce with customers, suppliers
and partners, which, more and more, is standard operating procedure.
Physical limitations have been largely removed by the Internet and by
the ability of institutions to connect their own electronic platforms to
the Internet’s vast public structure, allowing information to flow easily
among internal and remote users.
7
CYBER RISK
The increasing dependence on electronic processes and network-based
technology has brought about new challenges for companies of all
shapes and sizes. The major challenge is how to manage cyber risk—
the risks, liabilities and solutions associated with electronic processes
and interactions arising from conducting business activities through
computer networks and internet.
Financial Consequences
8
There is very little credible reporting of unauthorized network access
and whether it is law enforcement related or not, it does not provide a
clear picture of the total harm associated with these kinds of
exposures. However, the Computer Security Institute (CSI) and the San
Francisco Federal Bureau of Investigation’s Computer Intrusion Squad
conduct a survey every year allowing the respondents to participate
under complete anonymity. This CSI/FBI Computer Crime and Security
Survey, discloses the scope of what approximately 700 large
corporations and public entities think about this risk. It shows that
there is a tremendous amount of unauthorized computer use, theft of
proprietary information and denial of service attacks that are
continuing to be a big problem with financial companies. According to
the 2006 CSI/FBI Survey, 56 percent of companies reported some form
of unauthorized computer use. Theft of proprietary information caused
the greatest financial loss, with the average reported loss being
approximately $3.7 million.
Technology Limitations
Buying a technology solution isn’t the magic cure .It doesn’t mean that
companies should put security as a low priority in their IT budget. It is
alarming how little companies actually spend of their IT budget on
security. In some cases spending is even less than 10%. There is a
huge problem in determining how much money is spent on this kind of
risk in the organization.
Application Development
9
part of the business case and the business requirements. Applications
have been launched without the best care and standards of testing
built in. Of course once something goes wrong then the application is
pulled back and then looked back what was wrong with this application
but it is not the right way to learn about security problems, particularly
if organization is involved in financial services.
There are several things that can help a company manage network
security risk. Any risk management plan first has to be supported by
senior management. Then secondly there is a need of team approach.
Having a team approach is important because everyone has a stake in
this security and privacy risk like operations, IT, finance, internal audit,
the lawyers, etc, all have a vested interest. There isn’t one aspect of
this risk that can be operated without the others.
10
11
WHAT IS CYBER INSURANCE
Cyber insurance is an insurance scheme for the entities operating in
cyberspace.
Cyberspace has cyber crimes and to deal with them we need a new
way of thinking and in addition to the technological solutions, one of
the proposed mechanisms to address this very challenge is Cyber
Insurance.
These days almost all the companies are some how connected to
internet through E-Business and this intensive use of internet all over
the world has significantly increased the vulnerability of organizations
to cyber crimes, thereby making the corporate executives focus on
information security issues.
12
Cyber insurance can even take some security decisions out of IT
control and place them in the hands of insurance adjusters and
actuarial tables damages caused due to cyber-risk i.e. hacking, DoS
attacks. Cyber insurance comes into the role when it comes to risk with
cyber-space.
Before the late 1990s, little commercial demand existed for property or
liability insurance specifically covering losses from network security
breaches or other IT-related problems. However, the rapid growth of e-
commerce, followed by distributed denial-of-service (DDoS) attacks
that took down several leading commercial Web sites in February
2000, kindled significant interest in such coverage. The Y2K computer
problem, although ultimately resulting in little direct damage or loss,
brought further attention to cyber risk issues and pointed out the
limitations of existing insurance coverage for IT failures.
13
Accountability Act and the Graham-Leach-Bliley Act, which mandate
protection of sensitive personal medical and financial records.
California also passed a Se c urity Bre a c h Inform a tion Ac t
requiring prompt public disclosure of any breach that might have
compromised computer-based personal information about a California
resident. This California law, which went into effect in July 2003,
essentially sets a national requirement for any business or other
organization that maintains a database with identifiable individual
records.
14
Benefits of cyberinsurance
In other areas, such as fire protection, insurance has helped align
private incentives with the overall public good. A building owner must
have fire insurance to obtain a mortgage or a commercial business
license. Obtaining insurance requires that the building meet local fire
codes and underwriting standards, which can involve visits from local
government and insurance company inspectors. Insurance
investigators also follow up on serious incidents and claims, both to
learn what went wrong and to guard against possible insurance abuses
such as fraud. Insurance companies often sponsor research, offer
training, and develop best-practice standards for fire prevention and
mitigation. Most important, insurers offer lower premiums to building
owners who keep their facilities clean, install sprinklers, test their
control systems regularly, and take other protective measures. Fire
insurance markets thus involve not only underwriters, agents, and
clients, but also code writers, inspectors, and vendors of products and
services for fire prevention and protection. Although government
remains involved, well-functioning markets for fire insurance keep the
responsibility for and cost of preventive and protective measures
largely within the private sector.
15
• Data aggregation and promulgation of best practices.
• Development of a robust institutional infrastructure that supports
information security management.
• Thus cyberinsurance can, in principle, be an important risk-
management tool for strengthening IT security and reliability,
both for individual stakeholders and for society at large.
Insured’s Issues
16
security requirements required to establish a safe and competitive
presence. Recent regulations and standards have also forced many
organizations to rethink they way they do business. They appreciate
that there are threats that could disable their ability to continue
participating as an electronic business. Organizations are able to
acquire coverage even if they have merely met the minimum
standards established by the insurance industry. Electronic users are
beginning to realize that their information is important to them.
17
Insurance Policy Coverage
Earlier, insurance had been restricted to medical, life and protection
against damages to assets. But due to globalization, technology
improvement, internet, and the rapid growth of e-commerce scenario
is completely changed.
18
19
The table below lists policy structures that are typical of cyber
associated insurance coverage available on the market today.
20
Coverage business upon the loss of a key employee. The
tax-free proceeds from this policy can be used
to find, hire and train a replacement,
compensate for lost business during the
transition, or finance any number of timely
business transactions.
21
EVOLUTION OF CYBER INSURANCE
As organizations become more dependent on their networked
computer assets, Technology, internet. There is new attention on the
preservation of information and electronic assets deemed to be critical
to the business. Companies are become more vulnerable due to the
increasing frequent and damaging attacks. Protection from harm on
any networked computer system will never be 100%. In the past
decade, protection techniques have continually improved and but
Internet attacks continue to increase. While some Internet security
vendors are selling solutions in the form of hardware and software but
Internet security protection is a continual process involving people that
cannot be solved entirely with products. Most relevantly, while most
organizations have focused on preventing cyber attacks solely by
technical means, this is only part of an overall solution.
21
Business Perspectives of Cyberinsurance
(1) The insurer who seeks to capture profit from premiums exceeding
losses over time by spreading the risk of uncertain loss events across
many independent clients
22
The first option is to avoid being exposed to cyber-risks by not having
any dependence on computers, networked machines, or any Internet
website presence. For some people/organizations this is feasible, but
for most commercial organizations this is not economically possible.
The fourth option is to transfer risk to a third party in which case this
third party must be an insurance company for performing this function.
Insurance allows an organization to smooth payouts for uncertain
events into predictable periodic costs.
23
• The end result is a market-solution with aligned economic
incentives between cyber insurers and organizations. Cyber
insurers seek profit opportunities from accurately pricing
cyberinsurance and organizations seek to hedge potential losses.
24
Table below illustrates how early hacker insurance started from simple
and small amount coverage from losses against hacker attacks, to
more differentiated and wide coverage products.
25
errors &
omissions);
$25M
26
standard. Other firms not specifically covered by the regulations may
have a general common law duty to protect the information under their
control.
27
More Sophisticated Cyberinsurance Policies
28
Another noticeable feature of recent cyberinsurance products is that
they have narrow coverages designed to target different kinds of
consumers. One reason for this practice is that insurers are able to
exclude coverage of unforeseeable events by narrowly defining the
insurance coverage. Another rationale is that by defining coverage
more specifically, cyber insurers are able to engage in product
differentiation and thus offer their products to specific markets. For
example, cyber insurers have created products that are specifically
meant to target firms concerned about damage to their own systems,
products designed for firms who only want third party liability
coverages, or products designed to cover media liability.
29
Issues in Developing Coverage
Adverse Selection
In equilibrium, the high risk firms choose a contract that has full
insurance coverage, while the low risk ones chose a contract that has
only partial coverage. That is, the low risk firms suffer, because while
the high risk firms get full coverage, low risk firms do not.
30
with the detailed security questionnaire, some consisting of about 250
queries, to assess security risks and cyber protections.
This is the mechanism cyber insurers use to work around the adverse
selection problem. The rigorous security assessment allowed insurers
to distinguish between high and low risk applicants. By employing a
clever mechanism of checking the applicants’ security, insurers are
able to avert a market failure that results from adverse selection and
thus prevents the company from the losses.
Moral Hazard
The difference between the moral hazard problem and the adverse
selection problem are
(1) Costs
(2) The incentive structure.
31
of IT security in society. Thus, the detailed risk assessment conducted
by insurers in developing cyberinsurance coverage works both to
identify the risk type of the insured and in so far as tying the risk
classification to premium incentives the insured to adopt a higher level
of security
1) Insurers stipulate in the contract that they are not liable for losses or
claims arising from the insured’s failure to maintain a level of security
equal to or superior to those in place at the inception date of the
policy.
2) Insurer stipulate that insured firms cannot claim payment for loss or
claim associated with failure to take reasonable actions to maintain
and improve their security.
32
33
CYBER CRIME
Life is about a mix of good and evil. So is the Internet. For all the good
it does us, cyberspace has its dark sides too. Unlike conventional
communities though, there are no policemen patrolling the information
superhighway, leaving it open to everything from Trojan horses and
viruses to cyber stalking, trademark counterfeiting and cyber
terrorism.
Cyber crime spans not only state but national boundaries as well. So it
is necessary that an international organization provide a standard
definition of the cyber crime. At the Tenth United Nations seminar a
workshop was conducted on the issues of crimes related to computer
networks.
Cyber crime was broken into two categories and defined as:
34
TYPES OF CYBER CRIME
Financial Claims:
This would include cheating, credit card frauds, money laundering etc.
Cyber Pornography:
Linking:
E-Mail spoofing:
A spoofed email is one that appears to originate from one source but
actually has been sent from another source. This can also be termed
as E-Mail forging.
Forgery:
35
Counterfeit currency notes, postage and revenue stamps, mark sheets
etc., can be forged using sophisticated computers, printers and
scanners.
Cyber Stalking:
Cyber squatting:
E-Mail bombing:
Data diddling:
This kind of an attack involves altering the raw data just before it is
processed by a computer and then changing it back after the
processing is completed.
Salami attacks:
Those attacks are used for the commission of financial crimes. The key
here is to make the alteration so insignificant that in a single case it
would go completely unnoticed e.g. A bank employee inserts a
program into bank’s servers, that deducts a small amount from the
account of every customer.
36
Denial of Service:
Virus/worm:
Logic bombs:
These are dependent programs. This implies that these programs are
created to do something only when a certain event occurs, e.g. some
viruses may be termed logic bombs because they lie dormant all
through the year and become active only on a particular date.
Trojan Horse:
37
Examples
Fraud and Extortion
Viruses
• The Love Bug virus (also known as the "I Love You" virus) spread
rapidly through corporate email systems, infecting networks of
hundreds of companies around the world. This attack was
followed a few days later by as many as 11 copycat versions of
the virus. It is estimated that the series of attacks collectively
cost billions of dollars in lost business income and extra
programming time.
38
discovered after the confidential information was leaked to
another party and subsequently used as a part of an identity
theft scheme.
Online Trespass
Unauthorized Access
39
Identity Theft
Unauthorized Access
40
Cyber Crime Statistics (India)
As per NCRB records (2006), 453 cyber crimes were registered across
the country including 162 under the IT Act and 291 under IPC .The
report also said a total of 565 people were arrested across the country
in 2006 on charges of cyber crime, which registered a decrease of 28
cases as compared to previous year.
Of the 291 cases registered under IPC, majority of the crimes fall under
3 categories viz. Criminal Breach of Trust or Fraud (156), Forgery (71)
and Counterfeiting (64). Though, these offences fall under the
traditional IPC crimes, the cases had the cyber tones wherein
computer, Internet or its related aspects were present in the crime and
hence they were categorized as Cyber Crimes under IPC.
As per NCRB records (2005), 481 cyber crimes were registered across
the country including 179 under the IT Act and 302 under IPC. Of this,
155 were registered in Gujarat alone including two under IT Act and
153 under IPC. The figures throw up some other interesting aspects.
The highest number of arrests too is from Gujarat. Of the 551 total
arrests including 178 under IT Act and 373 under IPC, 302 are from
Gujarat only.
As per the National Crime Records Bureau statistics, during the year
2005, 179 cases were registered under the IT Act as compared to 68
cases during the previous year, thereby reporting a significant increase
of 163.2% in 2005 over 2004. During 2005, a total of 302 cases were
registered under IPC sections as compared to 279 such cases during
2004, thereby reporting an increase of 8.2% in 2005 over 2004.
41
During 2006, number of cases under Cyber Crimes relating to
Counterfeiting of currency/Stamps stood at 53 wherein 118 persons
were arrested during 2006. Of the 47,478 cases reported under
Cheating, the Cyber Forgery (71) accounted for 0.14 per cent. Of the
total Criminal Breach of Trust cases (13,432), the Cyber frauds (156)
accounted for 1.1 %. Of the Counterfeiting offences (2,055), Cyber
Counterfeiting (64) offences accounted for 3.1%
Although shows cyber crime is on decline but the true story is far
different from the Statistics. It is found that in India, cyber crime is not
reported too much. According to the survey conducted on cyber crime
reported. The result shows that only 10% of the cases were reported
and that one percent got registered as FIRs. The reason behind this is
that the victim is either scared of police harassment or wrong media
publicity which could hurt their reputation and standing in society.
Also, it becomes extremely difficult to convince the police to register
any cyber crime, because of lack of orientation and awareness about
cyber crimes and their registration and handling by the police.
42
CYBER LAW
Many countries, until most recently, have only begun to realize the
capability of the Internet, and at the same time they have not
understood the damaging risks resulting in weak laws or a complete
absence of laws regarding cyber crime and electronic commerce. This
causes great obstacles to international cooperation with respect to
jurisdiction and geographies.
Technology suits will be played out in the courts as the legal system
tests the boundaries of new legislations in field of cyber laws. Industry
should expect to experience litigation being initiated by large
corporations to individuals pursuing the need to protect their personal
assets. Small to midsized organizations should not assume that they
are exempt from potential litigation and that this scenario will only
affect large corporations.
43
Gramm-Leach-Bliley
HIPAA
44
driver’s license number or other data that could be used for identity
theft purposes.
This California law says “if you suspect that you have a breach
associated with a customer’s electronically stored personal
information, as defined by the statute, then you are required to
provide notice to each customer whose personal information may have
been compromised. A violation of the statute could subject a company
to a private civil action in the state of California brought by an
individual or a group.
45
LEGAL SCENARIO IN INDIA
The Constitution of 1950 does not expressly recognize the right to
privacy. However, the Supreme Court first recognized in 1964 that
there is a right of privacy implicit in the Constitution under Article 21 of
the Constitution, which states, "No person shall be deprived of his life
or personal liberty except according to procedure established by law”.
1.Digital Signatures
2. E-Governance
3. Justice Delivery System
4. Offences & Penalties
5. Amendments in the various Acts.
46
been set up at the state and city level, for example in the state of
Karnataka and the city of Mumbai.
With the boom in the Information Technology Sector and the increasing
protests against off-shoring to India, both in the US and the UK, BPO
companies in India have stepped up security measures for protection
of their data, thereby somewhat contributing to protect privacy. As
India has increasingly become a base for outsourcing operations, in
2004 there have been discussions in government circles that
amendments to the Information Technology Act would have to be
introduced to ensure protection of data and preservation of privacy.
The NAASCOM, India's premier software body, has pushed for some
time for a privacy law that has been stalled within political circles.
However, it is more likely that the law is coming close to being enacted
after NAASCOM made certain suggestions to the government.
47
Brief Analysis of I.T. Act 2000
“The May of this millennium, India witnessed the enactment of
Information Technology Act. An Act that is a class of legislation of its
own. An act to govern and regulate the high-tech virtual electronic
world.... the cyber world.”
Digital Signatures
With the passing of the Act, any subscriber (i.e., a person in whose
name the Digital Signature Certificate is issued) may authenticate
electronic record by affixing his Digital Signature. Electronic record
means data record or data generated image or sound, store, received
or send in an electronic form or microfilm or computer generated
microfiche.
Electronic Governance
48
Regulation of Certifying Authorities
49
while trying out cases of this nature shall consider the amount of gain
of unfair advantage or the amount of loss that. The aforesaid
provisions were not incorporated in the Information Technology Bill,
1999 and the same were suggested by the Select Committee of
Parliament.
Under the Act, the Central Government has the power to establish the
Cyber Regulations Appellate Tribunal. The Tribunal shall have the
power to entertain the cases of any person aggrieved by the Order
made by the Controller of Certifying Authority or the Adjudicating
Officer.
Offences
50
Computer Related Crimes Covered under IPC and
Special Laws
51
INDUSTRY THREAT STATISTICS
In 200, the CSI/FBI released its 2006 Computer Crime and Security
Survey referencing respondent’s insights into cyber crime incidents
and the financial effects on their organizations. There were 700
security practitioners who offered their responses from industries such
as, U.S. corporations, government agencies, financial, health, and
educational institutions.
52
DETAILED FINDINGS OF SOME OF THE
IMPORTANT ISSUES ARE
By the survey it is found that people are still are not very keen to
purchase cyberinsurance.
As the graph shows only 29 % companies are insured by
cyberinsurance products rest are still depends on the traditional
methods like firewall, antivirus, cryptography and other methods but
more companies are insured compare to 2005 where just 25%
companies are insured. Thus the 2006 survey indicates that cyber
insurance is gaining momentum, although many believe that this
situation will improve over time.
53
This question was aimed at determining the typical size of an
organization’s information security budget relative to the
organization’s overall IT budget.
• 32 % of respondents indicated that their organization allocated
between 1 % and 5 %of the total IT budget to security.
• Only 21 % of respondents indicated that security received less
than 1 percent of the IT budget,
• 34 % of respondents indicated that security received more that 5
percent of the budget,
• 12 % of the respondents indicated that the portion was unknown
to them.
54
• Firms with annual sales under $10 million spent an average of
approximately $1566 per employee ($502 in operating expense ,
$746 in capital expenditures, $318 in awareness training) on
computer security;
• Firms with annual sales between $10 million and $99 million
spent an average of approximately $572 per employee ($241 in
operating expense and $220 in capital expenditures, $111 in
awareness training) on computer security.
• Firms with annual sales between $100 million and $1 billion
spent an average of approximately $148 per employee ($92 in
operating expense and $34 in capital expenditures, $22 in
awareness training) on computer security.
• The largest firms—those with annual sales over $1 billion—spent
an average of about $218 per employee ($142 in operating
expense and $58in capital expenditures, $18 in awareness
training).
55
• Survey shows that outsourcing of computer security work has not
increased over the past year. 1 % of respondents indicated that
their organizations outsource more 60% to 100% of the security
function.
• 4 % of respondents indicated that their organizations outsource
41 to 60 of the security function.
• 6 % of respondents indicated that their organizations just
outsource 21 % to 40% of the security function.
• 27 % of respondents indicated that their organizations outsource
upto 20% the security function
• 61% of respondents indicated that their organizations do no
outsourcing of the security function.
56
A number of important points may be inferred from figure, some of
which are not readily accessible from inspection of the figure, but
which are worthy of analysis.
• First, the real story of losses is that the total losses reported
declined dramatically. Total losses for 2006 were $52494290 for
the 313 respondents that were willing and able to estimate
losses—down from the $130104542 losses for the 269
respondents that were willing and able to estimate losses in
2005.
57
KEY FINDINGS
Some of the key findings from the participants in This year’s survey are
summarized below:
58
RISK EXPOSURE FOR INSTITUTION
Institution 1
• Business Activity - Offering financial services
• Number of Employees – 1 to 101
• Dependence on computers to handle daily business activities.
• Employees have access to the internet through computer system
and use e-mail in regular business communications.
• Critical business data stored electronically.
59
Possible business Steps to help reduce risk
exposure
Could incur the cost to 1. Routinely backup your computers files
repair or replace your and store the backups offsite.
computer system if it is 2. Hire an IT professional or consultant to
damaged by a covered oversee your computer hardware
cause of loss. This loss may protection needs
result in a loss of income or 3. Make sure to store all computers,
damage to your system, especially your server, in a dry, secure
data, or valuable location so that it’s not in direct threat of
documents. during the water or fire damage.
period that your computer
system is down.
Because e-mail is the 1. Install anti-virus software on all your
easiest entry point for PCs, firewalls, and e-mail servers to block
viruses and worms to virus attacks.
invade your system, you 2. Develop a procedure and stick to it to
may be susceptible to update all anti-virus software with online
attacks, resulting in a software “patches”.
financial loss, if one of your 3. Train employees on “safe computing”
computers were infected. which includes not opening e-mail
messages or attachments from a sender
you don’t know
An employee’s 1. Establish and distribute personnel
inappropriate or malicious policies that outline guidelines for
use of e-mail can result in appropriate e-mail and web usage while
Employment Practices at work.
claims against your 2. Enforce any policies you set up. Take
company, such as sexual action if guidelines aren’t followed.
harassment or racial 3. Consider installing software which
discrimination. monitor online activity by employees.
A hacker introduces a 1. Install the latest version of firewalls on
virus which destroys all of your systems to prevent unauthorized
your electronic data and access to your network.
files. 2. Make sure to use online software
“patches” to update your system so
you’re protected against the latest strain
of viruses.
3. Establish a business continuity plan
which addresses this type of exposure.
You could be sued for 1. Utilize software applications that
negligence if someone can monitor your network reliability and
prove that you could have performance.
taken reasonable steps to 2. Train staff members to use this
prevent a serious system software.
problem for one of your 3. Designate staff members to receive
clients. automatic pages, e-mails or messages
that alert when something is
malfunctioning.
A covered cause of loss 1. Develop a written business
forces you to shut down contingency plan.
and you lose significant 2. Outline response plans for virus,
income because it takes worm, or denial of service attacks, data
time to re-establish your recovery alternate power and facilities, 60
operations. networks, equipment and supplies.
3. Communicate the plan to any, and all,
61
SECURITY ASSESMENT
As a condition to developing coverage, cyber insurers evaluate the
applicant’s security through a myriad of offsite and on-site activities
with a view of reviewing the applicant’s vulnerabilities. Cyber insurers
require applicants to fill in a detailed online questionnaire, some
consisting of about 250 queries, to assess the applicants’ security risks
and cyber protections and well as conduct a top-to bottom physical
and technical analysis of security, networks, and procedures.
62
space leased from ISP; where each IP is located and what
machines.
• Description of network activities e.g., list of IP addresses; list of
managed devices like switches, hubs, routers, firewalls,
platforms and OS including proxy servers, security scanners,
anti-virus software, remote computer maintenance, firewall
tunneling, wireless communications etc.
63
COMPRHEHENSIVE ANALYSIS OF A CYBER
INSURANCE POLICY
A complete cyber insurance policy contains several coverage parts.
Insured means:
(1) The named insured;
(2) Any subsidiary of the named insured, but only with respect to
wrongful acts, extortion claims, failures of security, criminal reward
funds, crisis events or loss that occur while it is a subsidiary and is
otherwise covered by this policy;
(3) Any past, present or future employee of the named insured or
subsidiary thereof, but only while acting within the scope of their
duties as such;
(4) With respect to coverage A and coverage B for Internet media
services only, any agent or independent contractor, including
distributors, licensees and sub-licensees, in their provision of material
for Internet media on behalf or at the direction of the named insured,
but only in the event that a claim has also been brought against an
insured as defined in subparagraphs (1) through (3) above, and only
while such claim is pending against such insured;
(5) Any leased worker; and
As per the insuring Agreement the wordings for the coverage are:
64
Internet media. Such wrongful act(s) must occur during the policy
period.
65
Retention means the applicable retention set forth per claim as in
Declarations with respect to each coverage. Insurer will only pay for
loss in excess of any applicable Retention amounts set forth in the
Declarations. On his discretion, insurer may pay all or part of the
applicable Retention in which case insured agree to repay insurer
immediately after notification of the payment. The applicable
Retention shall first be applied to loss covered by the policy that is paid
by insurer or by the insured, with prior written consent of insurer.
With respect to coverages A, B and C, all claims arising from the same
wrongful act(s) or series of continuous, repeated, or related wrongful
acts shall be considered one claim and subject to the single highest
applicable Retention.
Claim means:
(1) A written or oral demand for money, services, non-monetary relief
or injunctive relief;
(2) A suit.
66
(b) An infringement of copyright, domain name, title, slogan,
trademark, trade name, trade dress, mark or service name, or any
form of improper deep-linking or framing; plagiarism, or
misappropriation of ideas under implied contract or other
misappropriation of property rights, ideas or information; or
67
• E-Commerce transaction services
• Electronic exchange and auction services
• Internet hosting services
• Internet media services
• Internet service provider (ISP services
• Managed and network security services
• Search engine services
Failure(s) of security shall also include such actual failure and inability
above, resulting from the theft of a password or access code by non-
electronic means in direct violation of your specific written security
policies or procedures.
68
However, in no event, shall any of the above constitute a failure of
security if resulting from operational errors, unintentional
programming errors, or any failure in project planning.
D. Cyber-Extortion Coverage
With respect to coverage D, all extortion claims from the same person,
or persons acting in concert, shall be treated as one extortion claim.
Any claim covered under coverages A, B or C that relates to or arises
from an extortion claim shall, together with the extortion claim, be
considered one claim, and subject to the single highest applicable
Retention.
69
E. Information Asset Coverage
(a) If insured cannot restore such information assets, but can recollect
such information assets, then information asset loss shall mean only
the actual cost he incurs to recollect such information assets.
70
F. Business Interruption Coverage
71
G. Criminal Reward Fund Coverage
Criminal reward fund means any amount offered and paid by insurer
for information that leads to the arrest and conviction of any
individual(s) committing or trying to commit any illegal act related to
any coverage under this policy. Provided, however, insurer shall not
pay any criminal reward fund for, and the policy shall not cover any
amount based upon, any information provided by insured, his auditors,
whether internal or external, any individual hired or retained to
investigate the aforementioned illegal acts, or any other individuals
with responsibilities for the supervision or management of the
aforementioned individuals.
72
EXCLUSIONS UNDER POLICY
Common exclusions for all cyber insurance coverages:
(2) Strikes or similar labor action, war, invasion, act of foreign enemy,
hostilities or warlike operations (whether declared or not), civil war,
mutiny, civil commotion assuming the proportions of or amounting to a
popular rising, military rising, insurrection, rebellion, revolution,
military or usurped power, act(s) of terrorism (whether domestic or
foreign), committed by a person or persons whether acting on their
own behalf or on behalf of or in connection with any organization, or
any action taken to hinder or defend against these actions; or
(3) Any direction or request to test for, monitor, clean up, remove,
contain, treat, detoxify or neutralize pollutants, or in any way respond
to or assess the effects of pollutants;
73
Under coverages A, B, C, D, G and H only, insurer does not
cover claims, wrongful acts or loss alleging, arising out of or
resulting, directly or indirectly, from:
74
Under coverages C, D, E and F only, insurer does not cover any
claim, wrongful act, or loss alleging, arising out of or resulting,
directly or indirectly, from:
75
COMPARITIVE STUDY OF THREE POLICIES
Table on Salient Provisions of Cyber insurance
Policies
Net e-Comprehensive Webnet Protection
Advantage
Security
COVERAGES
First Party
Coverages
Destruction, Y. Y. Expressly covers Y. Includes
disruption malicious coverage for losses
or theft of alteration due to malicious
information or malicious codes (“Malicious
assets destruction of code” defined as
information by any “software program
person, of that maliciously
information as a introduced into the
result of malicious computer the
code, of computer Insured’s
programs owned or Information
licensed. (This may Processing System
be covered under and/or networks,
definition of and propagates
“computer system” itself from one
(includes computer to
“computer another
software accessible without the
through the authorization of the
Internet”) Insured Company”.
of netAdvantage. Are viruses
excluded from
coverage?)
Includes computer
programs and
trade
secrets. Proviso
that information
and computer
program be
subject
to regular network
back-up
procedures.
Payment of actual
and necessary
76
expenses incurred
to replace or
restore
info assets to the
level which they
existed prior to the
loss
77
Rehabilitation Y. Reimbursement Y. Public relations
expenses for expenses expenses
incurred
to Reestablish the
reputation of the
insured (including
public relation
expenses)
Third Party Liability Coverages (For claims made during the policy period or
extended reporting period for acts committed by the insured on or after the Retroactive
Date and before the end of the Policy Period.)
Internet Content Y Y (Libel, invasion of Y. Libel, invasion
privacy (“the right of privacy,
of individual to plagiarism,
control infringement of IP
the disclosure of (except patent)
Information that
identifies the
individual,)
copyright
infringement,
plagiarism, etc.
Emotional distress
excluded.
Internet Security Y. For claims Y Y
arising from
“failure of
security”
(defined as:
failure of
insured’s
hardware,
software or
firmware
(including
firewalls,
filters,
DMZs,
antivirus)
including
theft of
passwords or
access code
which results
78
in a
computer
attack).
Note:
Unintentional
Programmin
g and/or
Operational
error does
not
constitute
failure in
security.
Defense Costs Y Y. Insurer has right Y
and duty to
defend.
Limit: up to
payment of “all
reasonable and
necessary legal
costs”.
EXCLUSIONS
Failure to back-up Y Y Y
Failure to take Y Y. Always includes In “Policy
reasonable steps proviso on its Conditions”: “You
to coverages: agree to protect
maintain and Provided and
upgrade security always that the maintain your
Insured Company computer system
maintain System and your e-
Security levels that business
are equal to or information assets
superior to those in and e-business
place as at the communications to
inception date of the level or
this standard at which
Policy they existed and
were
represented…”
Fraudulent, Y Y Y
dishonest and
criminal acts of
insured
Inability to use or Y. Due to Y. Any Implied exclusion:
lack of expiration, “malfunction or lack of
performance of cancellation, error in performance
79
software withdrawal, programming or of software
programs or have not errors or omissions programs not part
been in processing” (in of “qualifying
released computer cause”.
from programs)
Development excluded.
stage, or
have not
passed test
runs; or due
to
installation
or failure to
install
software; or
due to
configuration
problems.
Wear and tear of Y Y. “Loss resulting “Based upon or
insured’s from (a) arising out of
information mechanical ordinary wear and
assets failure, (b) faulty tear, gradual
construction, (c) deterioration of; or
error in design, (d) failure to maintain
latent defect, (e) [e-information]
wear and tear, (f) assets and
gradual computer systems
degradation, (g) on which they are
electrical processed…”
disturbance, (f)
failure, breakdown
or defect within the
medium upon
which any
electronic record
may be stored”
Electric and Y Y (see above). Failure of:
telecommunicatio (Also: “The failure telephone lines,
n or interruption of data transmission
failures the infrastructure or wireless
of the Internet or connections,
other telecommunication
telecommunication s
s equipments or
system, except electronic
where such infrastructure not
80
infrastructure was under the insured’s
under the control,
operational control malfunction of
of the insured. satellite, failure of
power or utility
service
Breach of patents First party: 1st party covered –
or trade secrets Trade as part of
secrets “electronic
covered information”.
provided Third party: Patent
valuation infringement
agreed upon; excluded
3 party both
rd
patents and
trade secrets
excluded
Loss or claim Y Y Y
notified
a prior insurer
Claim arising out Y Y Y
of liability to
related parties
(1st and 3rd party: Y
failure of any
computer or
software to
correctly assign
any date)
OTHER RELEVANT PROVISIONS
Retentions Retention There is only single Waiting period
same as in loss retentions specified for
liability limits (“arising out of any business
below + single event or interruption.
Retention series of related Each loss
waiting event”).Any deductible, and
hours for recovery (net of each claim
business expenses) of deductible, for any
interruption property, money, loss or claim
and internet etc., applied arising from the
extra according to same interrelated
expense (1) loss of insured qualifying cause.
coverages. on top of single
loss or aggregate
policy limits (2)
reimbursement of
81
amount paid by
insurer (3) single
loss retention.
Liability Limits Limit for Insurer liable only Aggregate Policy
each after insured Limit (for 1st and
wrongful act satisfies retention 3rd party losses).
or related and shall not Separate limits for
acts, each exceed policy limit. each coverage
for (a) Aggregate limits parts
internet for (a) 1st party (b) (3 3rd party
content 3rd party; with coverages and 6 1 st
82
reproducing, -record, or the assets]
recreating, purchase of to the level
or restoring hardware and or condition in
the insured’s software for actual which they existed
information reproduction of prior to the loss”).
assets”. info, program or e-
record.
Additional offices Establishment of
Covered additional offices
or
information
processing system
(other than
consolidation,
merger or
purchase of assets
of another
company) covered
provided insured
employs “at least
the same level
of system security
as were in place
for the existing
systems and
offices at the
inception of this
policy”.
Notice required Insured shall notify
for insurer of change
change of control in
power to
determine
management by
virtue of
ownership, voting
rights, or contract;
otherwise
coverage
terminated for loss
or claim “after the
date of change of
control”
Termination of Y. 30 days Y. 60 notice from
policy notice from insurer or
insurer. immediately on
83
receipt of notice
from insured; refund
of unearned
premiums computed
pro-rata. Insurers not
liable for loss not
discovered prior to
the effective date of
termination.
84
85
Q1) At what frequency is your website or internet
services updated?
monthly
12%
weekly
88%
86
Q2) whether a clearly stated privacy statement been
established on your website and has been reviewed
by legal council?
No
0%
Yes
100%
87
Q3) Are you aware of IT ACT 2000?
No
11%
Yes
89%
In the survey conducted out of 100, 89% are aware or It Act 2000 and
11% are not aware of IT Act 2000.
88
Q4) Do you have cyber insurance?
Yes
18%
Not aware
55%
No
27%
89
Q5) whether the corporate awareness training
sessions are provided to assist persons to understand
the security measures?
No
24%
Yes
76%
90
Q 6) Are firewalls in place to avert unauthorized
access to internally protected network from external
sources?
No
13%
Yes
87%
91
Q7) Are general backup and recovery procedures
documented?
No
0%
Yes
100%
According to the survey it has been found that all the companies have
backup and recovery procedures well documented.
It is very important in case of breach of security and to minimize the
losses.
It helps the company to recover their lost data easily after the loss.
92
Q8) In event of a security breach do you have
computer incident response team?
No
31%
Yes
69%
93
Q9) Do you sell product or services through your
website or internet services?
Yes
24%
No
76%
According to survey, only 24% companies sell their products while 76%
do not sell their products through their websites or internet services.
Insurance companies, banks, online portals sell their product through
their websites. On the other hand, IT companies use their website as a
tool to make people aware about their products and companies vision
and mission
94
Q10) security solution and implementation
Have any of these security system been
implemented
a) Security Management Software (SMS)
b) Routing and Switching Technology (RST)
c) Data Integrity Programs (DIP)
d) Virtual Private Networking (VPN)
SMS
29%
VPN
37%
RST
16%
DIP
18%
VPN, SMS, RST, DIP are most commonly used security system in India.
All these system helps the company from external attacks or viruses.
According to the survey 37% companies uses VPN as security system.
29% companies uses SMS technique, 18% uses DIP technique and 16%
RST security system.
In all the above security systems VPN is most secured system and
hence widely used in companies.
95
Q11) Are credit & criminal background checks being
performed on all existing / new employees and
consultants?
Yes
41%
No
59%
According to the survey 41% companies check the credit & cyber
crime background of new employees as well as existing employees.
Where 59% companies do not check these important issues.
In today’s cyber world it is very necessary to check credit/cyber crime
background of all the employees to save the company from any cyber
loss.
96
Q12) How often the firewalls, intrusion prevention
and anti virus safeguards updated or Product
revisions?
weekly
8%
monthly
22%
automatic
55%
semi-annually
15%
97
Q13) Do you prefer In-house projects/outside
projects?
In house
project
not applicable 11%
22%
outside project
67%
98
RECOMMENDATIONS
• There should be more specific coverage available to the
customer.
99
100
CONCLUSION
Till now, insurance had been restricted to medical, life and protection
against damages to assets. Initially IT industry had been left out of the
purview of insurance and IT companies had suffered losses from the
cyber extortion, e-business interruption, denial of service attacks to
programming errors, incorrect recommendations and even
inappropriate installation and training.
The fact that businesses are becoming more dependent on the Internet
creates a whole new set of risks and the Internet has helped
companies expand their reach and explore alternate business
opportunities but it has also left them vulnerable to denial of service
attacks and hacking. Many companies have faced ransom demands
from cyber squatters who occupy domain names on the Internet that
should rightfully belong to the company. Even software developers and
companies are liable for legal action from customers dissatisfied with
their products or services.
The biggest problem was that most traditional insurance plans don't
include coverage for cyber risks is because the technology revolution is
a relatively new phenomenon, and insurance companies have been
slow to respond.
Different insurer are providing insurance coverage for cyber space and
giving IT companies Banks, BPOs etc a relief to work freely in cyber
space. Companies like Tata–AIG, ICICI Lombard , HDFC General
insurance are providing cyberinsursnce to the companies.
101
BIBLIOGRAPHY
BOOKS AND MAGAZINES REFERRED:
Economic times.
• Insurance post October 2007
• Hacker attack by Richard mansfield
WEBSITES REFERRED:
102
• Ask the Expert
--http://www2.cio.com/ask/expert/2003/questions/question1577.
html?CATEGORY=6&NAME=Cyber%20Behavior
• A directory of markets for cyber insurance
--http://www.agentandbroker.com/default.cfm?page=291
• Cyber Insurance Terms & Definitions
--http://www.imms.com/cyberglos/#c
103
Annexure
104
Questionnaires
COMPANY NAME:
NAME OF RESPONDENT:
DESIGNATION:
Yes/no
105
10. Do you have cyber insurance?
a. Yes
b. No
c. Not Aware
11. Are credit & criminal background checks being performed on all
existing/new employees, and consultants?
Yes/no
12. How often the firewalls, intrusion prevention and anti virus
safeguards updated or product revisions?
a. Weekly
b. Monthly
c. yearly
Date : Signature
106
GLOSSARY
Ankle Biter
Attack
An attempt to bypass security controls on a computer. The attack may
alter, release, or deny data. Whether an attack will succeed depends
on the vulnerability of the computer system and the effectiveness of
existing countermeasures.
Audit Trail
In computer security systems, a chronological record of system
resource usage. This includes user login, file access, security violations
occurred, legitimate or unauthorized.
Birthday attack
Based on the statistical probability that finding two identical elements
in a known finite space, the expected effort takes the square root of
the key space number of steps. Example: with only 23 people in a
room, there is a better than even chance that two have the same
birthday.
Bomb
A general synonym for crash, normally of software or operating system
failures.
Breach
The successful defeat of security controls, which could result in a
penetration of the system. A violation of controls of a particular
information system such that information assets or system
components are unduly exposed.
107
in computers and computer networks or the computers and networks
themselves.
Correlation attack
Combining the output of several stream ciphertext sequences in some
nonlinear manner. Thus revealing a correlation with the combined
keystream and attacked using linear algebra.
Cracker
A popular hacking tool used to decode encrypted passwords. System
administrators also use Crack to assess weak passwords by novice
users in order to enhance the security. Cracker: One who breaks
security systems.
Cracking
The act of breaking into a computer system. The act of breaking into a
computer system or account; what a cracker does. Contrary to
widespread myth, this does not usually peristence and the dogged
repetition of a handful of fairly well-known tricks that exploit common
weaknesses in the security of target systems.
Craming
A subtle scam used to get someone to change telephone long distance
carriers without their knowledge.
Darkside hacker
A criminal or malicious hacker, opposite of a white-hat hacker.
Data diddling
The act of intentionally entering false information into a system or
modifying existing data.
Data-in-motion attack
An adversary’s attempt to capture information while in transit, similar
to man-in-the-middle-attack.
Denial of service
Action(s) that prevent any part of an information system from
functioning in accordance with its intended purpose. Usually flooding a
system to prevent it from servicing normal and legitimate requests.
108
Derf
Gaining physical access to a computer that is currently logged in by an
absent minded individual.
Hacker
A person who enjoys exploring the details of computers and how to
stretch their capabilities. A malicious or inquisitive meddler who tries
to discover information by poking around. A person who enjoys
learning the details of programming systems and how to stretch their
capabilities, as opposed to most users who prefer to learn the
minimum necessary.
Hacking
Unauthorized use, or attempts to circumvent or bypass the security
mechanisms of an information system or network.
Hijacking
An action whereby an active, established, session is intercepted and
co-opted by the unauthorized user. IP splicing attacks may occur after
an authentication has been made, permitting the attacker to assume
the role of an already authorized user. Primary protections against IP
splicing rely on encryption at the session or network layer.
Indirection
Covering your tracks so that the target cannot identify or prove who is
attacking them.
Internet worm
A worm program that was unleashed on the Internet in 1988. Robert T.
Morris wrote it as an experiment that got out of hand.
IP spoofing
An attack whereby a system attempts to illicitly impersonate another
system by using IP network address.
Letterbomb
A piece of e-mail containing live data intended to do malicious things
to the recipient’s machine ‘or terminal. Under UNIX, a letterbomb can
also try to get part of its contents interpreted as a shell command to
the mailer. The results of this could range from silly to denial of
service.
Logic bomb
109
the system which, when satisfied, triggers the perpetration of an
unauthorized act.
Mailbomb
The mail sent to urge others to send massive amounts of email to a
single system or person, with the intent to crash the recipient’s
system. Mailbombing is widely regarded as a serious offense.
Malicious code
Hardware, software, of firmware that is intentionally included in a
system for an unauthorized purpose; e.g. a Trojan horse.
Man-in-the-middle
An active attack that typically is gaining information by sniffing or
tapping a line between two unsuspecting parties.
Passive attack
Attack which does not result in an unauthorized state change, such as
an attack that only monitors and/or records data.
Passive cheater
The threat of unauthorized disclosure of information that doesn’t
change the state of the system. A type of threat that involves the
interception, not the alteration, of information.
Perimeter security.
The technique of securing a network by controlling access to all entry
and exit points of the network. Usually associated with firewalls and/or
filters.
Piggyback attack
Gaining unauthorized access to a system via another user’s legitimate
connection.
Ping –of-Death
The use of Ping with a packet size higher than 65,507. This will cause a
denial of service.
Sniffer/sniffing
a program running on a computer or device that’s attached to a
network that filters, captures, and records network traffic, i.e. packets.
Spam
A program to capture data across a computer network. Used by
hackers to capture user ID names and passwords. Also a software tool
that audits and identifies network traffic packets.
110
Spoofing
Impersonating a server or person without permission. Pretending to be
someone else. The deliberate inducement of a user or a resource to
take an incorrect action. Attempt to gain access to a system by
pretending to be an authorized user. Impersonating, masquerading,
and mimicking are forms of spoofing.
Superzapping
The use of a utility program to modify information in computers.
Leaving no trail of evidence, it circumvents the application from
processing data or commands.
Threat
The means by which to launch a threat agent to adversely affect an
automated system, facility, or operation can be manifest. A potential
violation of security.
Tripwire
A software tool for security. Basically, it works with a database that
maintains information about the byte count of files. If the byte count
has changed, it will identify it to the system security manager.
Trojan horse
An apparently useful and innocent program containing additional
hidden code, which allows the unauthorized collection, exploitation,
falsification, or destruction of data.
Virus
A program that can infect other programs by modifying them to
possibly include an evolved copy of itself.
Worm
Independent program that replicates from machine to machine across
network connections, often-clogging networks and information systems
as it spreads.
111