Skip to main content

Insurability of Critical Infrastructures

  • Chapter
  • First Online:
The Security of Critical Infrastructures

Abstract

We fit a Pareto distribution to a sample of documented intentional attacks on critical infrastructure, and we introduce procedures by which unbiased consistent estimators for the auxiliary parameters of this distribution can be found. We then compare these estimators to standard industry practice, drawing conclusions about the relative magnitude of risk premiums for intentional attack. Further, we simulate the bankruptcy risk of any private insurance firm that offers coverage for such attacks by adapting the standard SRI model to our context. Using our estimators in a randomized Pareto process, we run simulations of accumulated net profit and loss for different value at risk parametrizations. Our results suggest that it is highly unlikely any private firm would offer coverage for an intentional attack on critical infrastructure.

Electronic Supplementary Material The online version of this chapter (https://doi.org/10.1007/978-3-030-41826-7_3) contains supplementary material, which is available to authorized users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alcaraz, C., Lopez, J.: Analysis of requirements for critical control systems. Int. J. Crit. Infrastruct. Prot. 5(3–4), 137–145 (2012)

    Article  Google Scholar 

  2. Alcaraz, C., Zeadally, S.: Critical control system protection in the 21st century. Computer 46(10), 74–83 (2013)

    Article  Google Scholar 

  3. Background on: Terrorism risk and insurance. Technical Report. Insurance Information Institute (2019). https://www.iii.org/article/background-on-terrorism-risk-and-insurance

  4. Bernoulli, J.: Ars conjectandi: Usum & applicationem praecedentis doctrinae in civilibus, moralibus & oeconomicis, chap. 4. Turneysen Brothers, Basel (1713). Translated into English by Oscar Sheynin

    Google Scholar 

  5. Cornell, C.A.: Engineering seismic risk analysis. Bull. Seismol. Soc. Am. 58(5), 1583–1606 (1968)

    Google Scholar 

  6. Cummins, J.D., Trainar, P.: Securitization, insurance, and reinsurance. J. Risk Insur. 76(3), 463–492 (2009)

    Article  Google Scholar 

  7. Embrechts, P., Schmidli, H.: Modelling of extremal events in insurance and finance. Z. Oper. Res. 39(1), 1–34 (1994)

    Google Scholar 

  8. Gordon, L.A., Loeb, M.P., Lucyshyn, W., Zhou, L.: Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. J. Inf. Secur. 6(1), 24 (2015)

    Google Scholar 

  9. Gurenko, E.N.: Catastrophe Risk and Reinsurance: A Country Risk Management Perspective. The World Bank, Washington, DC (2004)

    Book  Google Scholar 

  10. Harrington, S.: Market discipline in insurance and reinsurance. Market Discipline Across Countries and Industries 1, 159–173 (2004)

    Google Scholar 

  11. Harrison, K., White, G.: A taxonomy of cyber events affecting communities. In: 44th Hawaii International Conference on System Sciences, pp. 1–9. Institute of Electrical and Electronics Engineers (IEEE), Piscataway (2011)

    Google Scholar 

  12. Jones, E., Oliphant, T., Peterson, P.: SciPy: Open source scientific tools for Python (2001)

    Google Scholar 

  13. Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. Proc. R. Soc. London, Ser. A Math. Phys. Charact. 115(772), 700–721 (1927)

    Google Scholar 

  14. Liebenberg, A.P., Sommer, D.W.: Effects of corporate diversification: evidence from the property–liability insurance industry. J. Risk Insur. 75(4), 893–919 (2008)

    Article  Google Scholar 

  15. Marquardt, D.W.: An algorithm for least-squares estimation of nonlinear parameters. J. Soc. Ind. Appl. Math. 11(2), 431–441 (1963)

    Article  Google Scholar 

  16. Marshall, C.L., Marshall, D.C.: Measuring and Managing Operational Risks in Financial Institutions: Tools, Techniques, and Other Resources. John Wiley, Hoboken (2001)

    Google Scholar 

  17. McNeil, A.J., Frey, R., Embrechts, P.: Quantitative Risk Management: Concepts, Techniques and Tools-Revised Edition. Princeton University Press, Princeton (2015)

    Google Scholar 

  18. Michel-Kerjan, E., Morlaye, F.: Extreme events, global warming, and insurance-linked securities: how to trigger the “tipping point”. Geneva Pap. Risk Insur. – Issues Pract. 33(1), 153–176 (2008). https://EconPapers.repec.org/RePEc:pal:gpprii:v:33:y:2008:i:1:p:153-176

    Article  Google Scholar 

  19. Michel-Kerjan, E., Pedell, B.: Terrorism risk coverage in the post-9/11 era: a comparison of new public–private partnerships in France, Germany and the US. Geneva Pap. Risk Insur. – Issues Pract. 30(1), 144–170 (2005)

    Article  Google Scholar 

  20. Mitchell-Wallace, K., Foote, M., Hillier, J., Jones, M.: Natural Catastrophe Risk Management and Modelling: A Practitioner’s Guide. John Wiley & Sons, Hoboken (2017)

    Google Scholar 

  21. Mutenga, S., Staikouras, S.K.: The theory of catastrophe risk financing: a look at the instruments that might transform the insurance industry. Geneva Pap. Risk Insur. – Issues Pract. 32(2), 222–245 (2007)

    Article  Google Scholar 

  22. Pawlak, Z., Wong, S., Ziarko, W.: Rough sets: probabilistic versus deterministic approach. Int. J. Man Mach. Stud. 29, 81–95 (1988)

    Article  Google Scholar 

  23. Pflug, G.C.: Some remarks on the value-at-risk and the conditional value-at-risk. In: Probabilistic Constrained Optimization, pp. 272–281. Springer, Berlin (2000)

    Google Scholar 

  24. Quandt, R.E.: Old and new methods of estimation and the Pareto distribution. Metrika 10(1), 55–82 (1966)

    Article  Google Scholar 

  25. Rinaldi, S.M.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Hawaii International Conference on System Sciences. Institute of Electrical and Electronics Engineers (IEEE), Piscataway (2004)

    Google Scholar 

  26. Rinaldi, S.M., Peerenboom, J.P., Kelly, T.K.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control. Syst. Mag. 21(6), 11–25 (2001)

    Article  Google Scholar 

  27. Rytgaard, M.: Estimation in the Pareto distribution. ASTIN Bull. J. IAA 20(2), 201–216 (1990)

    Article  Google Scholar 

  28. Shorack, G.R., Wellner, J.A.: Empirical Processes with Applications to Statistics. SIAM, Philadelphia (2009)

    Book  Google Scholar 

  29. SwissRe: sigma 2/2019: Secondary natural catastrophe risks on the front line. https://www.swissre.com/institute/research/sigma-research/sigma-2019-02.html

  30. Yusta, J.M., Correa, G.J., Lacal-Arántegui, R.: Methodologies and applications for critical infrastructure protection: state-of-the-art. Energy Policy 39(10), 6100–6119 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sébastien Gillard .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gillard, S., Anderhalden, D. (2020). Insurability of Critical Infrastructures. In: Keupp, M. (eds) The Security of Critical Infrastructures. International Series in Operations Research & Management Science, vol 288. Springer, Cham. https://doi.org/10.1007/978-3-030-41826-7_3

Download citation

Publish with us

Policies and ethics