SlideShare a Scribd company logo
Quantifying e-Commerce Risk David Fishbaum, FSA Chuck McClenahan, FCAS MMC ENTERPRISE RISK CAS Seminar on Ratemaking - March, 2001
The Problem You’re the risk manager of a financial institution with a new web site Your insurance broker has provided you a quote for new e-commerce risk insurance coverage:  $350,000 - $450,000 with low limits Your not exactly sure what the risks of the web site are What to do?
Background The financial institution provides community banks with a product portfolio of ancillary products such as: investments (mutual funds and stock trading) insurance other banking services You provide web sites for these community banks for investments, insurance and lending
What are the risks? Failure of the web site problems with the surroundings, power failure, fire or flooding failure of the hardware failure of the software attack through virus or computer hacker
Resultant damages are also varied Delay in performing a service Loss of brand value due to unreliability of service or transmission of computer virus loss of value through failure to deliver for example, an uncompleted stock trade
Background:  E-commerce insurance coverage There is an intensive application the problem is that you can’t figure out how complex or risky a web site you are running A system audit is part of the insurance coverage there is a bias to find fault
How do you insure the high P/E ratio Its 1999 and the price/earnings ratio of the e-commerce function seems to have broken down The unspoken issue is how do you insure the value lost if something happens to the web site? Not sure this is an issue today
Why bring in Actuaries? Looking for someone to quantify the risk We brought a multidisciplinary team of actuaries, economists and policy expert The actuaries provided the quantification and modeling skill sets
Methodology Model the web site Stochastic testing Scenario testing
Model MMC ER developed a computer program to model the economic performance of the e-commerce infrastructure Used company’s performance statistics Used a  Monte Carlo  simulation to produce expected revenue and branding values Based on this quantification, valued the potential losses of a series of scenarios
Application Server/Firewall/Proxy Layer ISP Provider In our estimation of the probability of failure at the application host level, elements such as software outage, hardware outage, data base performance etc were considered. Flow of Information and quantification of failure probabilities
Assumptions Visits per week Usage over the week Revenue Customer value Application acceptance Downtime
Results-Base Case
The Scenarios Denial of service Physical damage to hardware location New virus brings down complete system Malicious employee Threats/extortion Theft of credit card numbers
The Scenarios Attack causes a degradation of performance or loss of service to web site Not covered under current coverage Modeling assumption:  site down for 3 hours Income loss/Customer value loss Denial of service
The Scenarios Location of where hardware is kept is disabled Covered under current insurance Modeling assumption:  site down for 10 days Income loss/Customer value loss Client bank’s lost revenue Physical damage to hardware location
The Scenarios Not covered under current coverage Model assumption:  system down for 2 days Income loss/Customer loss New virus brings down complete system
The Scenarios Destruction of important data or programs Cost of recovery process covered under current coverage Not modeled Theft of policyholder info or other intangible property Not covered under current coverage Malicious Employee
The Scenarios Threat to commit a computer crime or to use information gained from a computer crime in exchange for money, personal gain or to embarrass the company Would be covered under current kidnap and ransom policies Threats/extortion
The Scenarios CD universe and Salesgate (e-mall) No credit card numbers are stored Theft of credit card numbers
Results of analysis Biggest risk business interruption Third party loss is minimal at this time though in time the Internet will affect its client relationship
Conclusions Better quantification of risks Better able to make a purchase decision Other risk management decisions What isn’t at risk is also important
Postscript The website is still in operation Strategy has been proven successful
e-Commerce Risk Bruce Schneier -  Secrets and Lies     (Wiley Computer Publishing, 2000) “ The insurance industry does this kind of thing all the time; it’s how they calculate premiums.  They figure out the annual loss expectancy for a given risk, tack on some extra for their operational costs plus some profit and use the result”
e-Commerce Risk Bruce Schneier -  Secrets and Lies     (Wiley Computer Publishing, 2000) “ Of course there’s going to be a lot of guesswork in any of these; the particular risks we’re talking about are just too new and too poorly understood to be better quantized (sic).”
e-Commerce Risk Pricing e-Commerce Risk Determine Strategy Identify the Risks Collect Available Data Develop Model Price According to Strategy
e-Commerce Risk Determine Strategy “Guess and Confess” Loss Leader Self-Supporting Franklin Approach
e-Commerce Risk Determine Strategy - “Guess and Confess” Insurer uses best available judgment (usually discovered deep in the bowels of the marketing department) as to the proper rate Alternatively, rely on advice of career agents
e-Commerce Risk Determine Strategy - Loss Leader Aptly named, this strategy is based upon the assumption that the best way to develop experience and expertise is to write a lot of exposure
e-Commerce Risk Determine Strategy - Self-Supporting Goal is to cover losses and expenses, including start-up expenses, over some reasonable period of time.  This is a radical strategy and has rarely been adopted in the property-casualty industry.
e-Commerce Risk Determine Strategy - Franklin Approach Focuses on loss avoidance Underwrites against “undesirable” hazards, e.g. large user base large asset base high public profile
e-Commerce Risk Identify the Risks We have a good track record here Medical Malpractice Computer Leasing Asbestos and Environmental
e-Commerce Risk How many do you recognize? Daemon Data mining Digital wallet Extranet Luhn formula Smart card Thin client
e-Commerce Risk How many do you recognize? Daemon  - a structured background process
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining  - looking for hidden data patterns
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining - looking for hidden data patterns Digital wallet  - encryption software, user ID
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet  - authorized outsider-available intranet
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula  - credit card verifying algorithm
e-Commerce Risk Luhn formula (1) Start with penultimate digit and, moving left, double the value of each alternating digit.  If you get a two digit number, add the two digits. (2) Add up all digits.  Result must be zero mod 10
e-Commerce Risk Luhn formula 1234 567890 12347 1 4 3 8  5 3 7 7 9 0  1 4 3 8 7 1+4+3+8+5+3+7+7+9+0+1+4+3+8+7=70
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula - credit card verifying algorithm Smart card  - personal electronic memory card
e-Commerce Risk How many do you recognize? Daemon - a structured background process  Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula - credit card verifying algorithm Smart card - personal electronic memory card Thin client  - network computer w/o hard drive
e-Commerce Risk Ingram Micro Inc. vs. American Guarantee & Liability Insurance Company “ The court finds that ‘physical damage’ is not restricted to the physical destruction or harm of computer circuitry, but includes loss of access, loss of use and loss of functionality .”
e-Commerce Risk Ingram Micro Inc. vs. American Guarantee & Liability Insurance Company “ Restricting the policy’s language to that proposed by American  [i.e.that contained in the policy]  would be archaic .”
e-Commerce Risk TD Waterhouse fined $225,000 for repeated outages which left customers unable to trade 11 online brokers reported 88 outages for 1st 9 months 1999 (12th firm reported so many outages it didn’t keep track).
e-Commerce Risk Collect Available Data Exposure base not well-defined Economic costs of losses not disclosed Industry is young and evolving Threat base is also evolving
e-Commerce Risk Collect Available Data Remember, “Lloyd’s List” was started in 1696 but it wasn’t until 75 years later that the Society of Lloyd’s was formed
e-Commerce Risk Develop Model Identify major processes Identify major threats Relate threats to processes Determine (or guess at) parameters
e-Commerce Risk Example - Distributed Denial of Service (DDoS)
e-Commerce Risk “ Attack of the Zombies” - February,2000 Monday, February 7 Yahoo!  portal rendered inaccessible for 3 hours Tuesday, February 8 Buy.com  90% inaccessible eBay  incapacitated CNN  95% inaccessible  Amazon.com  slowed to 5 minute access time Wednesday, February 9 ZDNet.com  unreachable E*Trade  slowed “to a crawl” Excite  60% inaccessible
e-Commerce Risk How DDoS Works Goal is to render system inoperable One attacker controls multiple servers Method: Break into numerous sites, install “attack script” and orchestrate coordinated attack
e-Commerce Risk USER PCs HACKER UNWITTING HOST “ ZOMBIE” OTHER NETWORK COMPUTERS VICTIM’S SERVER
 
 
e-Commerce Risk Price According to Strategy Frequency will vary with Popularity Profile Potential
e-Commerce Risk Price According to Strategy Severity will vary eToys v. E*Trade
e-Commerce Risk “ You gotta be careful if you don’t know where you’re going ‘cause you might not get there. ”   - Yogi Berra

More Related Content

PDF
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
PDF
Cover and CyberSecurity Essay
PDF
InformationSecurity_11141
PPT
How really to prepare for a credit card compromise (PCI) forensics investigat...
PDF
Cyber Risks - Maligec and Eskins
PDF
Is Cloud the new home for Cyber Criminals? How to be Safe?
PDF
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PDF
Reasons to be secure
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Cover and CyberSecurity Essay
InformationSecurity_11141
How really to prepare for a credit card compromise (PCI) forensics investigat...
Cyber Risks - Maligec and Eskins
Is Cloud the new home for Cyber Criminals? How to be Safe?
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Reasons to be secure

What's hot (20)

PDF
How to Establish a Cyber Security Readiness Program
PDF
cybersecurity-in-the-c-suite-a-matt
PPT
Cyber Insurance Temp
PDF
Managed Security For A Not So Secure World Wp090991
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
2016 Finance industry cybersecurity report
PDF
SecurityScorecard_2016_Financial_Report
PDF
Briefing paper: Third-Party Risks: The cyber dimension
PDF
Cyber liaility insurance the basics
PDF
How close is your organization to being breached | Safe Security
PDF
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
PDF
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
PDF
Top 10 leading fraud detection and prevention solution providers
PDF
WhiteHat’s Website Security Statistics Report 2015
PDF
CyberSecurity Insurance - The Ugly Truth!
PDF
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
PPTX
Security Best Practices for Small Business
PDF
Cybersecurity and The Board
PPTX
Cyber Liability - Insurance Risk Management and Preparation
PPTX
The CPAs Guide to Buying Cyber Insurance
How to Establish a Cyber Security Readiness Program
cybersecurity-in-the-c-suite-a-matt
Cyber Insurance Temp
Managed Security For A Not So Secure World Wp090991
Before the Breach: Using threat intelligence to stop attackers in their tracks
2016 Finance industry cybersecurity report
SecurityScorecard_2016_Financial_Report
Briefing paper: Third-Party Risks: The cyber dimension
Cyber liaility insurance the basics
How close is your organization to being breached | Safe Security
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
Top 10 leading fraud detection and prevention solution providers
WhiteHat’s Website Security Statistics Report 2015
CyberSecurity Insurance - The Ugly Truth!
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
Security Best Practices for Small Business
Cybersecurity and The Board
Cyber Liability - Insurance Risk Management and Preparation
The CPAs Guide to Buying Cyber Insurance
Ad

Similar to Ecommerce(2) (20)

DOCX
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
DOCX
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
PDF
Risk Analysis using open FAIR and Adoption of right Security Controls
PPTX
Risk Management ecommerce
PDF
Levon Ter-Isahakyan, Agoda. Machine Learning and Culture changes for better F...
PPTX
MIS: Information Security Management
PPT
PDF
2015 LOMA Conference - Third party risk management - Session 20
PPTX
Module 8 - External Crisis – Changing Technology.pptx
PPTX
Managing specialized risk_14
PPTX
1234567RISK-MANAGEMENT-FOR-SECURITY.pptx
PDF
Reputational Risk
PPTX
Cyber Security # Lec 3
PPTX
Iso27001 Risk Assessment Approach
PDF
EIS Amendments CA INTER
PDF
Outsourcing
PPTX
CRI Retail Cyber Threats
PPT
Software security engineering
PPTX
Infomation Technology class Presentation.pptx
PPTX
Chapter 17 a fraud in e commerce Jen
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Management ecommerce
Levon Ter-Isahakyan, Agoda. Machine Learning and Culture changes for better F...
MIS: Information Security Management
2015 LOMA Conference - Third party risk management - Session 20
Module 8 - External Crisis – Changing Technology.pptx
Managing specialized risk_14
1234567RISK-MANAGEMENT-FOR-SECURITY.pptx
Reputational Risk
Cyber Security # Lec 3
Iso27001 Risk Assessment Approach
EIS Amendments CA INTER
Outsourcing
CRI Retail Cyber Threats
Software security engineering
Infomation Technology class Presentation.pptx
Chapter 17 a fraud in e commerce Jen
Ad

More from ecommerce (19)

PPT
E Commerce14a(2)
PPT
E Com Center Klagenfurt
PPT
Maloney Slides
PPT
Ecommerce1
PPT
Cybercrime
PPT
E Commerce14a
PPT
B Hkorba
PPT
Am Cham Taipei Sept2004
PPT
Ecommerce(3)
PPT
Nordin Malaysia
PPT
B4 Gusmeroli
PPT
E Commerce052503
PPT
Wsis Alf C7 Unctad
PPT
Ecommerce
PPT
Documentation Set Up
PPT
Ecommerce Overview
PPT
Napier
PPT
S719a
PPT
Mea1
E Commerce14a(2)
E Com Center Klagenfurt
Maloney Slides
Ecommerce1
Cybercrime
E Commerce14a
B Hkorba
Am Cham Taipei Sept2004
Ecommerce(3)
Nordin Malaysia
B4 Gusmeroli
E Commerce052503
Wsis Alf C7 Unctad
Ecommerce
Documentation Set Up
Ecommerce Overview
Napier
S719a
Mea1

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Lesson notes of climatology university.
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Pharma ospi slides which help in ospi learning
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Computing-Curriculum for Schools in Ghana
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
GDM (1) (1).pptx small presentation for students
Lesson notes of climatology university.
Weekly quiz Compilation Jan -July 25.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Yogi Goddess Pres Conference Studio Updates
STATICS OF THE RIGID BODIES Hibbelers.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Pharma ospi slides which help in ospi learning
A systematic review of self-coping strategies used by university students to ...
Computing-Curriculum for Schools in Ghana
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...

Ecommerce(2)

  • 1. Quantifying e-Commerce Risk David Fishbaum, FSA Chuck McClenahan, FCAS MMC ENTERPRISE RISK CAS Seminar on Ratemaking - March, 2001
  • 2. The Problem You’re the risk manager of a financial institution with a new web site Your insurance broker has provided you a quote for new e-commerce risk insurance coverage: $350,000 - $450,000 with low limits Your not exactly sure what the risks of the web site are What to do?
  • 3. Background The financial institution provides community banks with a product portfolio of ancillary products such as: investments (mutual funds and stock trading) insurance other banking services You provide web sites for these community banks for investments, insurance and lending
  • 4. What are the risks? Failure of the web site problems with the surroundings, power failure, fire or flooding failure of the hardware failure of the software attack through virus or computer hacker
  • 5. Resultant damages are also varied Delay in performing a service Loss of brand value due to unreliability of service or transmission of computer virus loss of value through failure to deliver for example, an uncompleted stock trade
  • 6. Background: E-commerce insurance coverage There is an intensive application the problem is that you can’t figure out how complex or risky a web site you are running A system audit is part of the insurance coverage there is a bias to find fault
  • 7. How do you insure the high P/E ratio Its 1999 and the price/earnings ratio of the e-commerce function seems to have broken down The unspoken issue is how do you insure the value lost if something happens to the web site? Not sure this is an issue today
  • 8. Why bring in Actuaries? Looking for someone to quantify the risk We brought a multidisciplinary team of actuaries, economists and policy expert The actuaries provided the quantification and modeling skill sets
  • 9. Methodology Model the web site Stochastic testing Scenario testing
  • 10. Model MMC ER developed a computer program to model the economic performance of the e-commerce infrastructure Used company’s performance statistics Used a Monte Carlo simulation to produce expected revenue and branding values Based on this quantification, valued the potential losses of a series of scenarios
  • 11. Application Server/Firewall/Proxy Layer ISP Provider In our estimation of the probability of failure at the application host level, elements such as software outage, hardware outage, data base performance etc were considered. Flow of Information and quantification of failure probabilities
  • 12. Assumptions Visits per week Usage over the week Revenue Customer value Application acceptance Downtime
  • 14. The Scenarios Denial of service Physical damage to hardware location New virus brings down complete system Malicious employee Threats/extortion Theft of credit card numbers
  • 15. The Scenarios Attack causes a degradation of performance or loss of service to web site Not covered under current coverage Modeling assumption: site down for 3 hours Income loss/Customer value loss Denial of service
  • 16. The Scenarios Location of where hardware is kept is disabled Covered under current insurance Modeling assumption: site down for 10 days Income loss/Customer value loss Client bank’s lost revenue Physical damage to hardware location
  • 17. The Scenarios Not covered under current coverage Model assumption: system down for 2 days Income loss/Customer loss New virus brings down complete system
  • 18. The Scenarios Destruction of important data or programs Cost of recovery process covered under current coverage Not modeled Theft of policyholder info or other intangible property Not covered under current coverage Malicious Employee
  • 19. The Scenarios Threat to commit a computer crime or to use information gained from a computer crime in exchange for money, personal gain or to embarrass the company Would be covered under current kidnap and ransom policies Threats/extortion
  • 20. The Scenarios CD universe and Salesgate (e-mall) No credit card numbers are stored Theft of credit card numbers
  • 21. Results of analysis Biggest risk business interruption Third party loss is minimal at this time though in time the Internet will affect its client relationship
  • 22. Conclusions Better quantification of risks Better able to make a purchase decision Other risk management decisions What isn’t at risk is also important
  • 23. Postscript The website is still in operation Strategy has been proven successful
  • 24. e-Commerce Risk Bruce Schneier - Secrets and Lies (Wiley Computer Publishing, 2000) “ The insurance industry does this kind of thing all the time; it’s how they calculate premiums. They figure out the annual loss expectancy for a given risk, tack on some extra for their operational costs plus some profit and use the result”
  • 25. e-Commerce Risk Bruce Schneier - Secrets and Lies (Wiley Computer Publishing, 2000) “ Of course there’s going to be a lot of guesswork in any of these; the particular risks we’re talking about are just too new and too poorly understood to be better quantized (sic).”
  • 26. e-Commerce Risk Pricing e-Commerce Risk Determine Strategy Identify the Risks Collect Available Data Develop Model Price According to Strategy
  • 27. e-Commerce Risk Determine Strategy “Guess and Confess” Loss Leader Self-Supporting Franklin Approach
  • 28. e-Commerce Risk Determine Strategy - “Guess and Confess” Insurer uses best available judgment (usually discovered deep in the bowels of the marketing department) as to the proper rate Alternatively, rely on advice of career agents
  • 29. e-Commerce Risk Determine Strategy - Loss Leader Aptly named, this strategy is based upon the assumption that the best way to develop experience and expertise is to write a lot of exposure
  • 30. e-Commerce Risk Determine Strategy - Self-Supporting Goal is to cover losses and expenses, including start-up expenses, over some reasonable period of time. This is a radical strategy and has rarely been adopted in the property-casualty industry.
  • 31. e-Commerce Risk Determine Strategy - Franklin Approach Focuses on loss avoidance Underwrites against “undesirable” hazards, e.g. large user base large asset base high public profile
  • 32. e-Commerce Risk Identify the Risks We have a good track record here Medical Malpractice Computer Leasing Asbestos and Environmental
  • 33. e-Commerce Risk How many do you recognize? Daemon Data mining Digital wallet Extranet Luhn formula Smart card Thin client
  • 34. e-Commerce Risk How many do you recognize? Daemon - a structured background process
  • 35. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns
  • 36. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID
  • 37. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet
  • 38. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula - credit card verifying algorithm
  • 39. e-Commerce Risk Luhn formula (1) Start with penultimate digit and, moving left, double the value of each alternating digit. If you get a two digit number, add the two digits. (2) Add up all digits. Result must be zero mod 10
  • 40. e-Commerce Risk Luhn formula 1234 567890 12347 1 4 3 8 5 3 7 7 9 0 1 4 3 8 7 1+4+3+8+5+3+7+7+9+0+1+4+3+8+7=70
  • 41. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula - credit card verifying algorithm Smart card - personal electronic memory card
  • 42. e-Commerce Risk How many do you recognize? Daemon - a structured background process Data mining - looking for hidden data patterns Digital wallet - encryption software, user ID Extranet - authorized outsider-available intranet Luhn formula - credit card verifying algorithm Smart card - personal electronic memory card Thin client - network computer w/o hard drive
  • 43. e-Commerce Risk Ingram Micro Inc. vs. American Guarantee & Liability Insurance Company “ The court finds that ‘physical damage’ is not restricted to the physical destruction or harm of computer circuitry, but includes loss of access, loss of use and loss of functionality .”
  • 44. e-Commerce Risk Ingram Micro Inc. vs. American Guarantee & Liability Insurance Company “ Restricting the policy’s language to that proposed by American [i.e.that contained in the policy] would be archaic .”
  • 45. e-Commerce Risk TD Waterhouse fined $225,000 for repeated outages which left customers unable to trade 11 online brokers reported 88 outages for 1st 9 months 1999 (12th firm reported so many outages it didn’t keep track).
  • 46. e-Commerce Risk Collect Available Data Exposure base not well-defined Economic costs of losses not disclosed Industry is young and evolving Threat base is also evolving
  • 47. e-Commerce Risk Collect Available Data Remember, “Lloyd’s List” was started in 1696 but it wasn’t until 75 years later that the Society of Lloyd’s was formed
  • 48. e-Commerce Risk Develop Model Identify major processes Identify major threats Relate threats to processes Determine (or guess at) parameters
  • 49. e-Commerce Risk Example - Distributed Denial of Service (DDoS)
  • 50. e-Commerce Risk “ Attack of the Zombies” - February,2000 Monday, February 7 Yahoo! portal rendered inaccessible for 3 hours Tuesday, February 8 Buy.com 90% inaccessible eBay incapacitated CNN 95% inaccessible Amazon.com slowed to 5 minute access time Wednesday, February 9 ZDNet.com unreachable E*Trade slowed “to a crawl” Excite 60% inaccessible
  • 51. e-Commerce Risk How DDoS Works Goal is to render system inoperable One attacker controls multiple servers Method: Break into numerous sites, install “attack script” and orchestrate coordinated attack
  • 52. e-Commerce Risk USER PCs HACKER UNWITTING HOST “ ZOMBIE” OTHER NETWORK COMPUTERS VICTIM’S SERVER
  • 53.  
  • 54.  
  • 55. e-Commerce Risk Price According to Strategy Frequency will vary with Popularity Profile Potential
  • 56. e-Commerce Risk Price According to Strategy Severity will vary eToys v. E*Trade
  • 57. e-Commerce Risk “ You gotta be careful if you don’t know where you’re going ‘cause you might not get there. ” - Yogi Berra