Research Article

Modeling the Effect of Spending on Cyber Security by Using Surplus Process

Table 1

Traditional ruin theory and the proposed application on cyber security level modeling.

NotationTraditional ruin theoryApply to cyber security changes

Insurer’s surplus levelCompany’s cyber security level
Initial surplus levelInitial level of cyber security
Continuous premium incomeContinuous cyber security development derived from cyber security investment
Counting process of the number of claimsCounting process of the number of cyber attacks
Insurance claimsDamage to security level caused by the attacks
Ruin eventInsolvencyCyber breach