Skip to main content
Top

2018 | OriginalPaper | Chapter

Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-Terrorist Behavior

Authors : JiYoung Park, Jason Levy, Minsu Son, Changkeun Park, Ha Hwang

Published in: Security by Design

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An integrated framework to quantify the economic impacts of cyber-attacks on the U.S. airport security systems is put forth. A cyber-attack on the United States would involve complex strategic behavior by terrorists, who could invade an airport electronic system without any U.S. border or entry point. At the same time, defending entities must consider the complex processes that may cause any turmoil. The possibility of simultaneous threats from cyber-attacks makes it more difficult for defending entities to secure their airports, highlighting the need for improved and integrated inter-governmental collaboration. Collaborative networking requires close inter-governmental coordination to overcome such cyber-terrorism to protect critical infrastructure systems. Constructing a new model for strategic cyber-terror security requires a combination of competitive and cooperative game situations to develop specific strategies against cyber-terrorism. In addition, an airport shutdown would have ripple effects throughout domestic and international economies; these effects must be analyzed with a spatially disaggregate economic model. Combining competitive and cooperative game situations with an economic impact model, this study proposes the Game Theoretic National Interstate Economic Model (G-NIEMO) framework. G-NIEMO identifies which airport may be most vulnerable in the event that an airport electronic system is shut down. Using the probabilistic costs of airport closures, the model identifies the economic importance of cyber security by event location and industry type. From G-NIEMO, equilibrium strategies to protect U.S. airport systems can be developed and a general guideline for the evaluation of resource allocation can be provided to U.S. government agencies.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference General Accountability Office (2011) Cybersecurity: continued attention needed to protect our nation’s critical infrastructure and federal information systems, US Government, 16 Mar 2011 General Accountability Office (2011) Cybersecurity: continued attention needed to protect our nation’s critical infrastructure and federal information systems, US Government, 16 Mar 2011
4.
go back to reference Thomas M, Dhillon G (2011) Interpreting deep structures of information systems security. Comput J Adv Access Thomas M, Dhillon G (2011) Interpreting deep structures of information systems security. Comput J Adv Access
5.
go back to reference Dhillon G, Backhouse J (2000) Technical opinion: information systems security management in the new millennium. Commun ACM 43(7) Dhillon G, Backhouse J (2000) Technical opinion: information systems security management in the new millennium. Commun ACM 43(7)
6.
go back to reference Dhillon G, Torkzadeh G (2006) Value-focused assessment of information systems security in organizations. Inform Syst:293–314 Dhillon G, Torkzadeh G (2006) Value-focused assessment of information systems security in organizations. Inform Syst:293–314
7.
go back to reference Siponen MK (2005) An analysis of the traditional IS security approaches: implications for research and practice. Eur J Inf Syst 14, 3 (September 2005):303–315 Siponen MK (2005) An analysis of the traditional IS security approaches: implications for research and practice. Eur J Inf Syst 14, 3 (September 2005):303–315
8.
go back to reference Krauss L (1972) SAFE: security audit and field evaluation for computer facilities and information systems. Amacon, New York Krauss L (1972) SAFE: security audit and field evaluation for computer facilities and information systems. Amacon, New York
9.
go back to reference Broder JF, Tucker E (2012) Risk analysis and the security survey. Elsevier, Waltham Broder JF, Tucker E (2012) Risk analysis and the security survey. Elsevier, Waltham
10.
go back to reference Landwehr CE (1981) Formal models for computer security. ACM Computer Survey 13, 3w (Sept), pp 247–278 Landwehr CE (1981) Formal models for computer security. ACM Computer Survey 13, 3w (Sept), pp 247–278
11.
go back to reference McLean J (1990) The specification and modeling of computer security. Computer 23, 1 (Jan), pp 9–16 McLean J (1990) The specification and modeling of computer security. Computer 23, 1 (Jan), pp 9–16
12.
go back to reference Yang Y, Zhou Y (2011) Fuzzy logic based method for network information security risk assessment. In: International conference on internet technology and applications. IEEE, Wuhan Yang Y, Zhou Y (2011) Fuzzy logic based method for network information security risk assessment. In: International conference on internet technology and applications. IEEE, Wuhan
13.
go back to reference Reason JT (1990) Human error. Cambridge University Press Reason JT (1990) Human error. Cambridge University Press
16.
go back to reference Park J (2008) The economic impacts of dirty bomb attacks on the Los Angeles and Long Beach Ports: applying the supply-driven NIEMO (National Interstate Economic Model). J Homel Secur Emerg Manage 5(1) Park J (2008) The economic impacts of dirty bomb attacks on the Los Angeles and Long Beach Ports: applying the supply-driven NIEMO (National Interstate Economic Model). J Homel Secur Emerg Manage 5(1)
17.
go back to reference Park J, Gordon P, Moore JE II, Richardson HW, Wang L (2007) Simulating the state-by-state effects of terrorist attacks on three major US ports: applying NIEMO (National Interstate Economic Model). In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 208–234 Park J, Gordon P, Moore JE II, Richardson HW, Wang L (2007) Simulating the state-by-state effects of terrorist attacks on three major US ports: applying NIEMO (National Interstate Economic Model). In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 208–234
18.
go back to reference Richardson HW, Gordon P, Moore JE II (eds) (2007) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham Richardson HW, Gordon P, Moore JE II (eds) (2007) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham
19.
go back to reference Gordon P, Moore JE, Park JY, Richardson HW (2007) The economic impacts of a terrorist attack on the US commercial aviation system. Risk Anal 27(3):505–512CrossRef Gordon P, Moore JE, Park JY, Richardson HW (2007) The economic impacts of a terrorist attack on the US commercial aviation system. Risk Anal 27(3):505–512CrossRef
20.
go back to reference Oxford Economics (2009) Aviation: the real world wide web. Onward Publishing, Inc Oxford Economics (2009) Aviation: the real world wide web. Onward Publishing, Inc
21.
go back to reference Park J, Gordon P, Moore JE II, Richardson HW (2008) The state-by-state economic impacts of the 2002 shutdown of the Los Angeles-Long Beach Ports. Growth Change 39(4):548–572CrossRef Park J, Gordon P, Moore JE II, Richardson HW (2008) The state-by-state economic impacts of the 2002 shutdown of the Los Angeles-Long Beach Ports. Growth Change 39(4):548–572CrossRef
23.
go back to reference Park J, Cho J, Rose A (2011) Modeling a major source of economic resilience to disasters: recapturing lost production. Nat Hazards 58(1):163–182CrossRef Park J, Cho J, Rose A (2011) Modeling a major source of economic resilience to disasters: recapturing lost production. Nat Hazards 58(1):163–182CrossRef
24.
go back to reference Park J, Gordon P, Moore JE II, Richardson HW (2009) A two-step approach to estimating state-to-state commodity trade flows. Ann Reg Sci 43(4):1033–1072CrossRef Park J, Gordon P, Moore JE II, Richardson HW (2009) A two-step approach to estimating state-to-state commodity trade flows. Ann Reg Sci 43(4):1033–1072CrossRef
29.
go back to reference Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, Savage S (2010, May) Experimental security analysis of a modern automobile. In 2010 IEEE symposium on security and privacy (SP), pp 447–462. IEEE Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, Savage S (2010, May) Experimental security analysis of a modern automobile. In 2010 IEEE symposium on security and privacy (SP), pp 447–462. IEEE
31.
go back to reference Benkler Y (2011) The unselfish gene. Harvard Bus Rev 89(7/8):77–85 Benkler Y (2011) The unselfish gene. Harvard Bus Rev 89(7/8):77–85
32.
33.
go back to reference Benkler Y (2011a) The penguin and the Leviathan: the triumph of cooperation over self-interest, 1st. Crown Business, New York, NY Benkler Y (2011a) The penguin and the Leviathan: the triumph of cooperation over self-interest, 1st. Crown Business, New York, NY
34.
go back to reference Nowak M, Highfield R (2011) SuperCooperators: altruism, evolution, and why we need each other to succeed. Free Press Nowak M, Highfield R (2011) SuperCooperators: altruism, evolution, and why we need each other to succeed. Free Press
35.
go back to reference Sandler T, Arce M (2003) Pure public goods versus commons: benefit-cost duality. Land Econ 79(3):355–368CrossRef Sandler T, Arce M (2003) Pure public goods versus commons: benefit-cost duality. Land Econ 79(3):355–368CrossRef
36.
go back to reference Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991CrossRef Zhuang J, Bier VM (2007) Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort. Oper Res 55(5):976–991CrossRef
37.
go back to reference Frey BS, Luechinger S (2003) How to fight terrorism: alternatives to deterrence. Defence Peace Econ 14(4):237–249CrossRef Frey BS, Luechinger S (2003) How to fight terrorism: alternatives to deterrence. Defence Peace Econ 14(4):237–249CrossRef
38.
39.
go back to reference Keohane NO, Zeckhauser RJ (2003) The ecology of terror defense. J Risk Uncertainty 26:201–229CrossRef Keohane NO, Zeckhauser RJ (2003) The ecology of terror defense. J Risk Uncertainty 26:201–229CrossRef
40.
go back to reference Chenery HB (1953) Regional analysis. In: Chenery HB, Clark PG, Pinna VC (eds) The structure and growth of the Italian economy. US Mutual Security Agency, Rome, pp 98–139 Chenery HB (1953) Regional analysis. In: Chenery HB, Clark PG, Pinna VC (eds) The structure and growth of the Italian economy. US Mutual Security Agency, Rome, pp 98–139
41.
go back to reference Moses LN (1955) The stability of interregional trading patterns and input-output analysis. Am Econ Rev 45(5):803–826 Moses LN (1955) The stability of interregional trading patterns and input-output analysis. Am Econ Rev 45(5):803–826
42.
go back to reference Isard W (1951) Interregional and regional input-output analysis: a model of a space-economy. Rev Econ Stat 33:318–328CrossRef Isard W (1951) Interregional and regional input-output analysis: a model of a space-economy. Rev Econ Stat 33:318–328CrossRef
43.
go back to reference Isard W (1960) Methods of regional analysis: an introduction to regional science. The MIT Press Isard W (1960) Methods of regional analysis: an introduction to regional science. The MIT Press
44.
go back to reference Polenske (1980) The US multiregional input-output accounts and model. DC Health, Lexington, MA Polenske (1980) The US multiregional input-output accounts and model. DC Health, Lexington, MA
45.
go back to reference Jack Faucett Associates, INC (1983) The multiregional input-output accounts, 1977: introduction and summary, vol. I (Final report), prepared for the US Department of Health and Human Services, Washington Jack Faucett Associates, INC (1983) The multiregional input-output accounts, 1977: introduction and summary, vol. I (Final report), prepared for the US Department of Health and Human Services, Washington
46.
go back to reference Miller RE, Shao G (1990) Spatial and sectoral aggregation in the commodity-industry multiregional input-output model. Environ Plan A 22(12):1637–1656CrossRef Miller RE, Shao G (1990) Spatial and sectoral aggregation in the commodity-industry multiregional input-output model. Environ Plan A 22(12):1637–1656CrossRef
47.
go back to reference Park J, Gordon P (2005) An evaluation of input-output aggregation error using a new MRIO model. In: Paper presented at North American meetings of the regional science association international 52nd annual conference, Riviera Hotel & Casino, Las Vegas, NV, 10–12 Nov Park J, Gordon P (2005) An evaluation of input-output aggregation error using a new MRIO model. In: Paper presented at North American meetings of the regional science association international 52nd annual conference, Riviera Hotel & Casino, Las Vegas, NV, 10–12 Nov
48.
go back to reference Richardson HW, Gordon P, Moore JE II, Park J, Kim S, Pan Q (2007) Tourism and terrorism: the national and interregional economic impacts of attacks on major US theme parks. In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 235–253CrossRef Richardson HW, Gordon P, Moore JE II, Park J, Kim S, Pan Q (2007) Tourism and terrorism: the national and interregional economic impacts of attacks on major US theme parks. In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 235–253CrossRef
49.
go back to reference Gordon P, Moore J, Park J, Richardson H (2009) The economic costs of border closure: a state-by-state analysis. In: Richardson HW, Gordon P, Moore JE II (eds) Global business and the terrorist threat. Edward Elgar, Cheltenham, pp 341–374 Gordon P, Moore J, Park J, Richardson H (2009) The economic costs of border closure: a state-by-state analysis. In: Richardson HW, Gordon P, Moore JE II (eds) Global business and the terrorist threat. Edward Elgar, Cheltenham, pp 341–374
50.
51.
go back to reference Hausken K (2004) Mutual raiding of production and the emergence of exchange. Econ Inq 42(4):572–586CrossRef Hausken K (2004) Mutual raiding of production and the emergence of exchange. Econ Inq 42(4):572–586CrossRef
52.
go back to reference Poole RW Jr (2007) Airport security: time for a new model. In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 67–97 Poole RW Jr (2007) Airport security: time for a new model. In: Richardson HW, Gordon P, Moore JE II (eds) The economic costs and consequences of terrorism. Edward Elgar, Cheltenham, pp 67–97
53.
go back to reference McDaniels T, Chang S, Cole D, Mikawoz J, Longstaff H (2008) Fostering resilience to extreme events within infrastructure systems: characterizing decision contexts for mitigation and adaptation. Glob Environ Change 18(2):310–318CrossRef McDaniels T, Chang S, Cole D, Mikawoz J, Longstaff H (2008) Fostering resilience to extreme events within infrastructure systems: characterizing decision contexts for mitigation and adaptation. Glob Environ Change 18(2):310–318CrossRef
54.
go back to reference Rose A (2004) Defining and measuring economic resilience to disasters. Disaster Prev Manage: Internat J 13(4):307–314CrossRef Rose A (2004) Defining and measuring economic resilience to disasters. Disaster Prev Manage: Internat J 13(4):307–314CrossRef
55.
go back to reference Rose A (2007) Economic resilience to disasters: multidisciplinary origins and contextual dimensions. Environ Hazards: Hum Soc Dimensions (forthcoming) Rose A (2007) Economic resilience to disasters: multidisciplinary origins and contextual dimensions. Environ Hazards: Hum Soc Dimensions (forthcoming)
56.
go back to reference Adger WN (2000) Social and ecological resilience: are they related? Prog Hum Geogr 24(3):347–364CrossRef Adger WN (2000) Social and ecological resilience: are they related? Prog Hum Geogr 24(3):347–364CrossRef
57.
go back to reference Park J, Gordon P, Jun E, Moore II JE, Richardson HW (2009b) Identifying the regional economic impacts of 9/11. Peace Econ Peace Sci Public Policy 15(2), Article 6 Park J, Gordon P, Jun E, Moore II JE, Richardson HW (2009b) Identifying the regional economic impacts of 9/11. Peace Econ Peace Sci Public Policy 15(2), Article 6
58.
go back to reference Rose AZ, Oladosu G, Lee B, Asay GB (2009) The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis. Peace Econ Peace Sci Pub Policy 15(2), Article 4 Rose AZ, Oladosu G, Lee B, Asay GB (2009) The economic impacts of the September 11 terrorist attacks: a computable general equilibrium analysis. Peace Econ Peace Sci Pub Policy 15(2), Article 4
59.
go back to reference Federal Emergency Management Agency (FEMA) (1997) HAZUS®99 earthquake loss estimation methodology: user’s manual Federal Emergency Management Agency (FEMA) (1997) HAZUS®99 earthquake loss estimation methodology: user’s manual
60.
go back to reference Rose A, Lim D (2002) Business interruption losses from natural hazards: conceptual and methodological issues in the case of the Northridge earthquake. Glob Environ Change B: Environ Hazards 4(1):1–14 Rose A, Lim D (2002) Business interruption losses from natural hazards: conceptual and methodological issues in the case of the Northridge earthquake. Glob Environ Change B: Environ Hazards 4(1):1–14
61.
go back to reference Rose A, Oladosu G, Liao SY (2007) Business interruption impacts of a terrorist attack on the electric power system of Los Angeles: customer resilience to a total blackout. Risk Anal 27(3):513–531CrossRef Rose A, Oladosu G, Liao SY (2007) Business interruption impacts of a terrorist attack on the electric power system of Los Angeles: customer resilience to a total blackout. Risk Anal 27(3):513–531CrossRef
62.
go back to reference Park JY, Gordon P, Moore JE II, Richardson HW, Kim S, Kim Y (2008b) Estimating the state-by-state economic impacts of Hurricane Katrina. In: Richardson HW, Gordon P, Moore JE II (eds) Natural disaster analysis after Hurricane Katrina. Edward Elgar, Cheltenham, pp 147–186 Park JY, Gordon P, Moore JE II, Richardson HW, Kim S, Kim Y (2008b) Estimating the state-by-state economic impacts of Hurricane Katrina. In: Richardson HW, Gordon P, Moore JE II (eds) Natural disaster analysis after Hurricane Katrina. Edward Elgar, Cheltenham, pp 147–186
63.
go back to reference Carnegie Mellon University (2006) CERT/CC vulnerability discovery project, CERT Coordination Center, Software Engineering Institute, Pittsburgh Pennsylvania Carnegie Mellon University (2006) CERT/CC vulnerability discovery project, CERT Coordination Center, Software Engineering Institute, Pittsburgh Pennsylvania
Metadata
Title
Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-Terrorist Behavior
Authors
JiYoung Park
Jason Levy
Minsu Son
Changkeun Park
Ha Hwang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-78021-4_15

Premium Partner