Loading [MathJax]/jax/output/SVG/jax.js
Clemente, Gian Paolo, Alessandra Cornaro, and Saverio Belvedere. 2025. “Pricing Cyber Risk Insurance Coverages by Means of Epidemic Models and Network Theory.” Variance 18 (April).
Download all (22)
  • Figure 1. Example of unweighted and undirected network with n=6 nodes and m=7 edges.
  • Figure 2. A small directed graph with arrows indicating the directions of the edges.
  • Figure 3. A path of length four in a graph.
  • Figure 4. Manufacturing company e-mail communication.
  • Figure 5. Infection-recovery scheme for a node.
  • Figure 6. SIS and ε-SIS models.
  • Figure 7. H-SIS and HG-SIS models.
  • Figure 8. Exponential vs Weibull distributions.
  • Figure 9. Weibull distributions.
  • Figure 10. Histograms of cost and recovery function.
  • Figure 11. Case Study 1 - Network plot.
  • Figure 12. Boxplot of parameters β for critical and not critical nodes.
  • Figure 13. Boxplot of loss cost for each node classified as not critical.
  • Figure 14. Boxplot of recovery cost for each node classified as not critical.
  • Figure 15. Boxplot of loss cost for the two nodes classified as critical.
  • Figure 16. Distribution of total cost split between amounts lower and higher than EUR 50,000, respectively.
  • Figure 17. Cullen and Frey plot of total cost.
  • Figure 18. Contour plot of the kurtosis and square of skewness combination.
  • Figure 19. Case Study 2 - Network plot.
  • Figure 20. Case Study 2 - Betas boxplot.
  • Figure 21. Average number of infections in Case Study 1 and 2.
  • Figure 22. Examples of the capabilities of the make-a-matrix function.

Abstract

This paper focuses on cyber risk, an emerging threat that significantly affects numerous sectors in today’s interconnected world. Among the strategies aimed at enhancing resilience and minimizing the impact of this risk, insurance contracts emerge as a potential solution. We present a heterogeneous generalized susceptible-​infectious-​susceptible model designed for pricing cyber risk insurance contracts. The model accurately captures the dynamics of cyber threats and evaluates the financial implications for insurance providers. It introduces an innovative method that distinguishes between critical and noncritical nodes within a network, enabling precise fortification against threats while optimizing resource allocation. Our findings show that the proposed method allows us to measure potential losses and reveals how the network’s structure influences the propagation of infections. This insight can be leveraged to enhance the overall security posture of the network. A numerical analysis, simulating the network structure of a small- to medium-sized enterprise validates the effectiveness of this approach.

Accepted: December 15, 2024 EDT