Presentation is loading. Please wait.

Presentation is loading. Please wait.

Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085.

Similar presentations


Presentation on theme: "Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085."— Presentation transcript:

1 Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.com

2 Chapter 16Forensic and Investigative Accounting2 Reasons to Quantify Loss To report the crime to law enforcement. To report the crime to law enforcement. To recover damages under an insurance policy. To recover damages under an insurance policy. To record for internal purposes. To record for internal purposes.

3 Chapter 16Forensic and Investigative Accounting3 Extent of the Problem In 2006, the annual Computer Crime and Security Survey of high-tech and financial corporations found: –$241,150 was the average loss with the largest loss set at $40M. –The most detectable crimes noted by the respondents were insider abuse, laptop theft, and virus or worm infections. –Twenty percent of respondents experienced rootkit or Trojan infections. (continued on next slide)

4 Chapter 16Forensic and Investigative Accounting4 Extent of the Problem –Eighty-three percent of the attacks originated from outside the organization. –Financial losses from breach of confidential information averaged $2M. –Over the previous year, there had been a doubling in the percent of attacks launched for “illicit financial gain.” (continued on next slide)

5 Chapter 16Forensic and Investigative Accounting5 Extent of the Problem –A notable change in 2006 was the increase in Trojan and rootkit attacks used to steal Internet banking and other passwords, or other personal information. –The source point for these attacks are the companies' point of Internet access. –A large percentage of the attacks in 2006 were conducted to simply create malicious damage.

6 Chapter 16Forensic and Investigative Accounting6 State Statutes Describing Losses The following factors are shown as remediable activities and loss classifications: –Verification costs to check systems (diagnosis–remediation). –Restoration costs to put systems back online (testing). –Market value or replacement value of the property destroyed or services. (continued on next slide)

7 Chapter 16Forensic and Investigative Accounting7 State Statutes Describing Losses –Lost profits. –Reasonable value of loss caused by “unavailability.” –Investigation costs. –Past or future losses. –Injury suffered. –Loss of computer time (lost productivity). –Cost of replacing lost data.

8 Chapter 16Forensic and Investigative Accounting8 Federal Identification of Damage Losses The federal government identifies the following damage losses in cyber attacks: –Responding to an attack. –Costs of making a damage assessment. –Time and costs of restoring the system. –Loss of revenues from the interruption. –“Other damages” related to an interruption of service.

9 Chapter 16Forensic and Investigative Accounting9 Examples of Tangible Losses Market value or replacement cost of property destroyed in attack. Market value or replacement cost of property destroyed in attack. External investigation costs. External investigation costs. Lost worker productivity. Lost worker productivity. Cost of replacing lost data. Cost of replacing lost data.

10 Chapter 16Forensic and Investigative Accounting10 Productivity Losses Productivity losses arise from the reduction of efficient, “normal” production of work due to an event such as a cyber attack.

11 Chapter 16Forensic and Investigative Accounting11 Examples of Intangible Losses Unavailability of a website. Unavailability of a website. Lost profits. Lost profits. General injury. General injury. Destroyed or lost information contained on compromised PCs. Destroyed or lost information contained on compromised PCs. Loss of optioned opportunities. Loss of optioned opportunities.

12 Chapter 16Forensic and Investigative Accounting12 Costs and Types of Insurance Coverage First-party liability coverage is for direct damage to the insured from a cyber attack. First-party liability coverage is for direct damage to the insured from a cyber attack. Third-party liability provides coverage from the negligent acts of the insured as, for example, when the insured’s computers are unknowingly used to launch an attack against a primary target. Third-party liability provides coverage from the negligent acts of the insured as, for example, when the insured’s computers are unknowingly used to launch an attack against a primary target. Premiums for these policies can cost $20,000 to $40,000 annually for coverage up to $50 million each. Premiums for these policies can cost $20,000 to $40,000 annually for coverage up to $50 million each.

13 Chapter 16Forensic and Investigative Accounting13 First-Party Cyber Insurance First-party cyber insurance usually includes coverage of losses from: –Malicious destruction or alteration of information. –Theft of data such as credit card numbers. –Lost business income up to 12 months after the attack. –Extortion from threats such as introducing viruses into a network. (continued on next slide)

14 Chapter 16Forensic and Investigative Accounting14 First-Party Cyber Insurance –Introducing fraudulent information into a network. –Defamation. –Cost to repair and replace data. –Unintentional virus transmission. –Denial of service attacks. –IP infringement from website squatters. –Illegitimate use of network. –Defacement of a website and related losses. (continued on next slide)

15 Chapter 16Forensic and Investigative Accounting15 First-Party Cyber Insurance –Coverage of extra expense incurred during a disruption. –External consultant fees. –Intellectual property infringement from the disclosure of trade secrets. –Rehabilitation expenses to reestablish the insured’s reputation and market share. –Crisis communication expenses with clients to provide assurances the system is reliable and safe.

16 Chapter 16Forensic and Investigative Accounting16 Seeking Insurance Coverage Qualifying for coverage Qualifying for coverage –Risk survey –Security audit What insureds should know about coverage What insureds should know about coverage –Third-party lawsuits –Intangible losses


Download ppt "Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085."

Similar presentations


Ads by Google