Author
Abstract
Digitalization is not only a source of development and innovation, but also carries a risk related to the growing number of threats in cyberspace—so-called cyber risk. Any significant disruption in cyberspace, whether global or local, will have an impact on the security of business transactions, a sense of security for citizens, the efficiency of public sector institutions, the course of production processes and services, and consequently on national security in general. Modeling extreme events in the area of cyber risk may be used in determining the level of capital necessary to cover financial losses resulting from low-probability high-impact (LPHI) events. We conduct an analysis of the tail distributions, using univariate extreme value theory. In particular, we adopt the peak-over-threshold (POT) by Generalized Pareto Distribution (GPD) approach for exceedances (tails). Moreover, we applied another approach to extreme risk modelling—fitting a spliced distribution. The splicing of a Mixed Erlang distribution for the body and an extreme value distribution (Pareto or GPD) for the tail as well as mixtures of gamma/log-normal/Weibull distributions with GDP are considered. This approach overcomes the subjectivity of manual threshold selection, because it can be estimated as a parameter. We compare the results of fitted distributions and draw conclusions based on VaR’s estimates for each analyzed models. We found that the GPD model has proven its superiority over spliced distributions in terms of goodness-of-fit and accuracy of VaR estimations. Therefore we conclude that the GPD is the most recommended distribution to model extreme risk measures (VaR, ES). VaR and ES indicate the level of risk capital that should be carried by a company in case of LPHI cyber event.
Suggested Citation
Grzegorz Strupczewski, 2019.
"What Is the Worst Scenario? Modeling Extreme Cyber Losses,"
Springer Proceedings in Business and Economics, in: Philip Linsley & Philip Shrives & Monika Wieczorek-Kosmala (ed.), Multiple Perspectives in Risk and Risk Management, pages 211-230,
Springer.
Handle:
RePEc:spr:prbchp:978-3-030-16045-6_10
DOI: 10.1007/978-3-030-16045-6_10
Download full text from publisher
To our knowledge, this item is not available for
download. To find whether it is available, there are three
options:
1. Check below whether another version of this item is available online.
2. Check on the provider's
web page
whether it is in fact available.
3. Perform a
for a similarly titled item that would be
available.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:prbchp:978-3-030-16045-6_10. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.