| 研究生: |
徐昊宇 Hao-Yu Syu |
|---|---|
| 論文名稱: |
結合FAIR與NIST資安框架分析資安風險:以醫療產業為例 |
| 指導教授: | 蔣偉寧 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 土木工程學系 Department of Civil Engineering |
| 論文出版年: | 2021 |
| 畢業學年度: | 109 |
| 語文別: | 中文 |
| 論文頁數: | 106 |
| 中文關鍵詞: | 資安風險 、資安保險 、保費計算 、資料外洩 、FAIR 、NIST |
| 外文關鍵詞: | cyber security, cyber insurance, assessment of premium, data breach, FAIR, NIST |
| 相關次數: | 點閱:18 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路的蓬勃發展,各國之資安風險逐年上升,因此保險產業也積極在資安領域發展保險市場,但台灣之保險產業至今於該領域發展仍有限,原因在於對資安風險之歸類與衡量了解不足。事實上即便在資安保險起步較早的美國,保險業者也並未對於自身之風險評估模型抱持足夠信心,台灣有類似狀況自然也不足為奇。
本研究將先彙整與介紹各種資安風險事件之分類、頻率、途徑、損失狀況、嚴重性分級等,並以現實或假想案例具體重現情境,不僅可供保險公司設計產品及擬定保費時參考,也可被投保企業做為研擬資安對策時的依據。之後則講解Jack Freund與Jack Jones發展之FAIR(factor analysis of information risk)模型,以及NIST(National Institute of Standards and Technology)之資安框架,再根據論文前半部提及的資料擬定FAIR之參數,並結合NIST之資安框架,以醫療機構為例評估其資料外洩時的風險大小,最後再進一步模擬保險公司以風險值求取保費的過程,以供其參照。
研究結果呈現了以醫療產業為例的分析成果,且由於業務性質的相似性,我們可預期本研究的風險評估流程也可套用於許多其他類型的投保企業。此外,各產業遭遇不同資安事件時的損失型態差異也已列表整理,不論是投保企業或保險公司,皆可以此為基礎調整營運方針。
With the vigorous development of the cyber activity, the cyber risks of various countries have increased yearly. Therefore, the insurance industry is also actively developing the insurance market in the cyber security field. However, in Taiwan, the development of insurance industry in this field is still limited due to insufficient understanding of classification and measurement of cyber risks. In fact, even in the United States, where cyber insurance started early, insurers did not have enough confidence in their own risk assessment model. It is not surprising that Taiwan is in such a predicament.
This research will first summarize and introduce the classification, frequency, approach, loss status, severity classification, etc. of various cyber risk events, and use real or hypothetical cases to specifically reproduce the situation, which can not only be used as a reference for insurance enterprises when designing products and drawing up premiums, but also be used by the insured enterprises as a basis for the research and development of cyber security policies. After that, this research will explain FAIR (Factor Analysis of Information Risk) model developed by Jack Freund and Jack Jones, and NIST (National Institute of Standards and Technology) cyber security framework, then draw up the parameters in FAIR based on the information mentioned in the first half of the paper, and combined with NIST cyber security framework, several medical institutions are used as examples to evaluate the risk of data breach, and finally the process of insurers obtaining premiums based on risk value is further simulated for their reference.
The research results show the consequences of the analysis taking medical industry as example, and due to the similarity of business, we can expect that the process of risk assessment in this research can also be applied to many other types of insured industries. Besides, types of losses experienced by diverse industries in various cyber incidents have also been tabulated. That can be used by insureds or insurers as a basis to adjust operating policies.
2017 Cyber Risk Landscape, p.12, Risk Management Solutions, Inc.
https://tw.appledaily.com/international/20210508/Q2FQQ6KCWRHX5KDRH23BZQHF6A/
https://udn.com/news/story/6811/5450840
2017 Cyber Risk Landscape, p.20, Risk Management Solutions, Inc.
https://ec.ltn.com.tw/article/paper/1444465
A Guide to Cyber Risk, p.4, Allianz Global Corporate & Specialty
A Guide to Cyber Risk, p.7, Allianz Global Corporate & Specialty
Cyber Risk Outlook, Risk Management Solutions, Inc., p.31
A Guide to Cyber Risk, p.5, Allianz Global Corporate & Specialty
Sasha Romanosky, Lillian Ablon, Andreas Kuehn and Therese Jones, ”Content analysis of cyber insurance policies: how do carriers price cyber risk?”, Journal of Cybersecurity, Vol. 5, No. 1, p.2, RAND Corporation, 2019
https://www.cna.com.tw/news/afe/201909140070.aspx
Sasha Romanosky, Lillian Ablon, Andreas Kuehn and Therese Jones, ”Content analysis of cyber insurance policies: how do carriers price cyber risk?”, Journal of Cybersecurity, Vol. 5, No. 1, p.13, RAND Corporation, 2019
https://qualitestgroup.com/insights/white-paper/data-breach-patterns-across-industries-and-time
https://www.hipaajournal.com/healthcare-data-breach-statistics/
https://www.taiwannews.com.tw/ch/news/2364722
https://news.ltn.com.tw/news/life/breakingnews/2550469
https://www.ithome.com.tw/news/144606
Managing Cyber Insurance Accumulation Risk, p.18, Risk Management Solutions, Inc.
Managing Cyber Insurance Accumulation Risk, p.14, Risk Management Solutions, Inc.
https://law.moj.gov.tw/LawClass/LawAll.aspx?pcode=J0140003
https://www.nhi.gov.tw/DL.aspx?sitessn=292&u=LzAwMS9VcGxvYWQvMjkyL3JlbGZpbGUvMC8xNDU5NTkv5o%2bQ5aCxMTA45bm06LKh5YuZ5aCx5ZGK6Yar6Zmi6Yar55mC5pyN5YuZ55Sz5aCx5oOF5b2iLeWFqOeQg%2bizh%2bioiue2suS4iue2si5vZHM%3d&n=5o%2bQ5aCxMTA45bm06LKh5YuZ5aCx5ZGK6Yar6Zmi6Yar55mC5pyN5YuZ55Sz5aCx5oOF5b2iLeWFqOeQg%2bizh%2bioiue2suS4iue2si5vZHM%3d&ico%20=.ods
Managing Cyber Insurance Accumulation Risk, p.25, Risk Management Solutions, Inc.
Managing Cyber Insurance Accumulation Risk, p.26, Risk Management Solutions, Inc.
Managing Cyber Insurance Accumulation Risk, p.27, Risk Management Solutions, Inc.
Benjamin Edwards, Steven Hofmeyr and Stephanie Forrest, ” Hype and heavy tails: A closer look at data breaches”, Journal of Cybersecurity, Vol. 2, No. 1, RAND Corporation, 2016
Managing Cyber Insurance Accumulation Risk, p.30, Risk Management Solutions, Inc.
Guidelines 01/2021 on Examples regarding Data Breach Notification, European Data Protection Board
2021 Data Breach Investigations Report (DBIR), Verison
https://www.ithome.com.tw/news/105160
Managing Cyber Insurance Accumulation Risk, p.52~ p.58, Risk Management Solutions, Inc.
The state of ransomware 2020, Sophos
https://www.ithome.com.tw/news/143958
https://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/
Managing Cyber Insurance Accumulation Risk, p.33~p.37, Risk Management Solutions, Inc.
Quarterly DDoS Attack Report, Radware
https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020
https://www.eweek.com/security/sony-data-breach-was-camouflaged-by-anonymous-ddos-attack/
https://www.pcmag.com/archive/playstation-hack-to-cost-sony-171m-quake-costs-far-higher-264796
https://www.ithome.com.tw/node/68865
https://arstechnica.com/gadgets/2011/07/how-charlie-miller-discovered-the-apple-battery-hackhow-a-security-researcher-discovered-the-apple-battery-hack/
https://gizmodo.com/new-hack-can-trick-power-bricks-into-starting-fires-1844441247
https://zh.wikipedia.org/wiki/%E9%9C%87%E7%BD%91
https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html
https://ithelp.ithome.com.tw/articles/10186904
https://en.wikipedia.org/wiki/Operation_Chastise
https://en.wikipedia.org/wiki/Hwacheon_Dam
https://en.wikipedia.org/wiki/Attack_on_the_Sui-ho_Dam
https://www.itsfun.com.tw/%E7%9F%B3%E5%A2%A8%E7%82%B8%E5%BD%88/wiki-7655216-7562195
https://www.techbang.com/posts/42951-ukraines-power-system-has-been-hit-by-phishing-and-discussions-about-how-to-strengthen-security
https://www.ithome.com.tw/news/114880
https://www.ithome.com.tw/news/142702
https://www.ithome.com.tw/news/142729
https://www.ithome.com.tw/news/138971
https://www.ithome.com.tw/news/144276
Managing Cyber Insurance Accumulation Risk, p.40~ p.43, Risk Management Solutions, Inc.
https://blog.trendmicro.com.tw/?p=55029
https://nos.nl/artikel/2343025-nederlandse-onderzoekers-manipuleren-verkeerslichten-met-virtuele-fietsers
https://www.hk01.com/%E4%B8%AD%E5%9C%8B/34570/%E8%B6%8A%E5%8D%97%E6%A9%9F%E5%A0%B4%E7%96%91%E9%81%AD%E8%8F%AF%E9%BB%91%E5%AE%A2%E5%85%A5%E4%BE%B5-%E8%88%AA%E7%8F%AD%E8%B3%87%E6%96%99%E8%AE%8A-%E5%8D%97%E6%B5%B7%E6%98%AF%E4%B8%AD%E5%9C%8B%E7%9A%84?fbclid=IwAR3VzEaslA73NXA7x-V_3ghIodql8iE3W2wTjFTRV8fawlEkAlfu_FTvOBo
https://www.zdnet.com/article/iran-reports-failed-cyber-attack-on-strait-of-hormuz-port/
https://news.ltn.com.tw/news/world/breakingnews/3618540
http://www.tssdnews.com.tw/index.php?FID=9&CID=571695
Managing Cyber Insurance Accumulation Risk, p.46~ p.48, Risk Management Solutions, Inc.
Managing Cyber Insurance Accumulation Risk, p.49, Risk Management Solutions, Inc.
https://www.opengroup.org/forum/security-forum-0/openFAIRandquantitativerisk