1. Introduction : what is insurance and what is cyber insurance? -- 1.1. What is an insurance contract? -- 1.2. What is unique about cyber insurance? -- 1.3. Security as a public good and insurance as risk control -- 1.4. Voluntary participation -- 1.5. Related literature -- 1.6. Roadmap -- 1.7. Intended audience
2. A basic cyber insurance contract model -- 2.1. A single-agent, single-period model -- 2.2. A single-agent, multi-period model -- 2.3. Numerical results -- 2.4. Chapter summary -- 2.5. Table of notations used in this chapter -- 2.6. Appendix
3. Insuring clients with dependent risks -- 3.1. A model of two agents -- 3.2. Two risk-neutral agents -- 3.3. Two risk-averse agents -- 3.4. Multiple agents, correlated losses, and the insurer's risk aversion -- 3.5. Numerical results -- 3.6. Chapter summary -- 3.7. Tables of notations used in this chapter -- 3.8. Appendix
4. A practical underwriting process -- 4.1. Computing premiums using base rates -- 4.2. The insurance policy model and analysis -- 4.3. Numerical examples -- 4.4. Discussions -- 4.5. Chapter summary -- 4.6. Table of notations used in this chapter -- 4.7. Appendix
5. How to pre-screen : risk assessment using data analytics -- 5.1. Predictive power of measurement data -- 5.2. Cyber incident forecast -- 5.3. Fine-grained prediction -- 5.4. Bringing technology to market -- 5.5. Chapter summary -- 6. Open problems and closing thoughts.
|