Design and Development of Cyber Insurance Policies Framework for Pre-Screening and Security Interdependence

N.Himakar Reddy, A. Swarupa Rani

Abstract


Cyber insurance is a feasible technique for cyber risk transfer. In any case, it has been demonstrated that relying upon the highlights of the hidden condition, it could possibly enhance the condition of system security. In this paper, we consider a solitary benefit boosting safety net provider (central) with intentionally partaking insureds/customers (specialists). We especially keen on two particular highlights of cybersecurity and their effect on the agreement structure issue. The first is the associated idea of cybersecurity, where by one substance's condition of security depends without anyone else venture and exertion as well as the endeavors of others' in the equivalent eco-framework (i.e., externalities). The second is the way that ongoing advances in Internet estimation joined with machine learning methods currently enable us to perform precise quantitative appraisals of security act at a firm dimension. This can be utilized as an apparatus to play out an underlying security review, or pre-screening, of a forthcoming customer to all the, more likely empower premium separation and the structure of modified policies. we demonstrate that security interdependency prompts a "benefit opportunity" for the guarantor, made by the wasteful exertion levels applied by reliant operators who don't represent the risk externalities when insurance isn't accessible this is not standing risk transfer that a backup plan regularly benefits from. Security pre-screening at that point enables the backup the plan to exploit this extra benefit open door

by structuring the fitting contracts which boost specialists to build their exertion levels, enabling the safety net provider to "pitch responsibility" to related operators, notwithstanding guaranteeing their risks. We recognize conditions under which this sort of agreement prompts expanded benefit for the primary yet, in addition, an enhanced condition of system security.


Full Text:

PDF




Copyright (c) 2019 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org