Chapter 16 - HCC Learning Web

Download Report

Transcript Chapter 16 - HCC Learning Web

Forensic and Investigative Accounting
Chapter 16
Cybercrime Loss Valuations
© 2011 CCH. All Rights Reserved.
4025 W. Peterson Ave.
Chicago, IL 60646-6085
1 800 248 3248
www.CCHGroup.com
Reasons to Quantify Loss
To report the crime to law enforcement.
 To recover damages under an insurance
policy.
 To record for internal purposes.

Chapter 16
Forensic and Investigative Accounting
2
Extent of the Problem
In 2006, the annual Computer Crime and Security Survey
of high-tech and financial corporations found:
– $241,150 was the average loss with the largest loss
set at $40M.
– The most detectable crimes noted by the respondents
were insider abuse, laptop theft, and virus or worm
infections.
– Twenty percent of respondents experienced rootkit or
Trojan infections.
(continued on next slide)
Chapter 16
Forensic and Investigative Accounting
3
Extent of the Problem
– Eighty-three percent of the attacks originated
from outside the organization.
– Financial losses from breach of confidential
information averaged $2M.
– Over the previous year, there had been a
doubling in the percent of attacks launched for
“illicit financial gain.”
(continued on next slide)
Chapter 16
Forensic and Investigative Accounting
4
Extent of the Problem
– A notable change in 2006 was the increase in
Trojan and rootkit attacks used to steal Internet
banking and other passwords, or other personal
information.
– The source point for these attacks are the
companies' point of Internet access.
– A large percentage of the attacks in 2006 were
conducted to simply create malicious damage.
Chapter 16
Forensic and Investigative Accounting
5
State Statutes Describing Losses
The following factors are shown as remediable
activities and loss classifications:
– Verification costs to check systems
(diagnosis–remediation).
– Restoration costs to put systems back online
(testing).
– Market value or replacement value of the
property destroyed or services.
(continued on next slide)
Chapter 16
Forensic and Investigative Accounting
6
State Statutes Describing Losses
– Lost profits.
– Reasonable value of loss caused by
“unavailability.”
– Investigation costs.
– Past or future losses.
– Injury suffered.
– Loss of computer time (lost productivity).
– Cost of replacing lost data.
Chapter 16
Forensic and Investigative Accounting
7
Federal Identification of
Damage Losses
The federal government identifies the
following damage losses in cyber attacks:
– Responding to an attack.
– Costs of making a damage assessment.
– Time and costs of restoring the system.
– Loss of revenues from the interruption.
– “Other damages” related to an interruption
of service.
Chapter 16
Forensic and Investigative Accounting
8
Examples of Tangible Losses
Market value or replacement cost of
property destroyed in attack.
 External investigation costs.
 Lost worker productivity.
 Cost of replacing lost data.

Chapter 16
Forensic and Investigative Accounting
9
Productivity Losses
Productivity losses arise from the reduction of
efficient, “normal” production of work due to
an event such as a cyber attack.
Chapter 16
Forensic and Investigative Accounting
10
Examples of Intangible Losses
Unavailability of a website.
 Lost profits.
 General injury.
 Destroyed or lost information contained on
compromised PCs.
 Loss of optioned opportunities.

Chapter 16
Forensic and Investigative Accounting
11
Costs and Types of
Insurance Coverage



First-party liability coverage is for direct damage
to the insured from a cyber attack.
Third-party liability provides coverage from the
negligent acts of the insured as, for example,
when the insured’s computers are unknowingly
used to launch an attack against a primary target.
Premiums for these policies can cost $20,000 to
$40,000 annually for coverage up to $50 million
each.
Chapter 16
Forensic and Investigative Accounting
12
First-Party Cyber Insurance
First-party cyber insurance usually includes
coverage of losses from:
– Malicious destruction or alteration of
information.
– Theft of data such as credit card numbers.
– Lost business income up to 12 months after
the attack.
– Extortion from threats such as introducing
viruses into a network.
(continued on next slide)
Chapter 16
Forensic and Investigative Accounting
13
First-Party Cyber Insurance
– Introducing fraudulent information into a
network.
– Defamation.
– Cost to repair and replace data.
– Unintentional virus transmission.
– Denial of service attacks.
– IP infringement from website squatters.
– Illegitimate use of network.
– Defacement of a website and related losses.
(continued on next slide)
Chapter 16
Forensic and Investigative Accounting
14
First-Party Cyber Insurance
– Coverage of extra expense incurred during a
disruption.
– External consultant fees.
– Intellectual property infringement from the
disclosure of trade secrets.
– Rehabilitation expenses to reestablish the
insured’s reputation and market share.
– Crisis communication expenses with clients to
provide assurances the system is reliable and
safe.
Chapter 16
Forensic and Investigative Accounting
15
Seeking Insurance Coverage
Qualifying for coverage
– Risk survey
– Security audit
 What insureds should know about coverage
– Third-party lawsuits
– Intangible losses

Chapter 16
Forensic and Investigative Accounting
16