Security Insurance and Best Practices
Selahattin Kuru, Onur Ihsan Arsun, and Mustafa Yildiz, Isik University, Turkey
Insurance and Risk Transfer Basics
Cybersecurity and Cyberinsurance
Challenges Associated with Assessing Information Security Risks
Legal Principles and Regulations
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Sarbanes-Oxley Act (SOA) of 2002
U.S. Food and Drug Administration (FDA) 21 CFR11
Federal Information Security Management Act (FISMA)
Conventional Coverage Types Applicable to Cybersecurity
Coverage Types Specific to Cybersecurity
Information Technology Infrastructure Library (ITIL)
Control Objectives for Information and Related Technology (COBiT)
Visa Cardholder Information Security Program (CISP)
INTRODUCTION
Insurance is a common tool for risk transfer. Individuals and organizations use this tool to transfer the risk of potential losses to another party, namely an insurance company. However, individuals and organizations have different motivations for purchasing insurance. In one classic example, a ship owner insures a ship and receives payment if the ship is damaged or destroyed. This example is one of the earliest uses of ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.