Popis: |
This paper suggests a possible alternative, original and supplementary (that is, it does not replace nor keep out those standard procedures which have become legal obligations) solution to the issue of network security, whatever the connection tool may be. The procedures regulating activities of prevention, analysis and management of any cyber-attack (known as cyber risk as well as, in more serious cases when individual is involved, cyber-crime) are increasingly numerous, both in privately-owned concerns and in public administration as well. Hereinafter, a terminal is referred to as any device that can be connected to the web via the Internet and/or Intranet. Therefore, this paper does not aim at suggesting a technological solution ¨C a specific task for antivirus programmer ¨C but at formulating the actuarial premises for coverage in case of cyber damage, also known as cyber-insurance. On the analogy of the coverage regarding health insurance and following an actuarial multistate approach, three levels of damage will be identified with regard to the functionality of the terminal. Two typologies of computer policies are hypothesized: ADC (Activities of Daily Cyber) and GCU (Good Cyber Use). |