Next Article in Journal
Definition of Discrete Choice Models of EV Owners Based on Different Socio-Demographic Aspects
Previous Article in Journal
Workload Balancing on Identical Parallel Machines: Theoretical and Computational Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems

by
Abdullah M. Algarni
1,*,
Vijey Thayananthan
1 and
Yashwant K. Malaiya
2
1
Computer Science Department, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Computer Science Department, Colorado State University, Fort Collins, CO 80523, USA
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(8), 3678; https://doi.org/10.3390/app11083678
Submission received: 13 March 2021 / Revised: 14 April 2021 / Accepted: 14 April 2021 / Published: 19 April 2021

Abstract

:
The evaluation of data breaches and cybersecurity risks has not yet been formally addressed in modern business systems. There has been a tremendous increase in the generation, usage and consumption of industrial and business data as a result of smart and computational intensive software systems. This has resulted in an increase in the attack surface of these cyber systems. Consequently, there has been a consequent increase in the associated cybersecurity risks. However, no significant studies have been conducted that examine, compare, and evaluate the approaches used by the risk calculators to investigate the data breaches. The development of an efficient cybersecurity solution allows us to mitigate the data breaches threatened by the cybersecurity risks such as cyber-attacks against database storage, processing and management. In this paper, we develop a comprehensive, formal model that estimates the two components of security risks: breach cost and the likelihood of a data breach within 12 months. The data used in this model are taken from the industrial business report, which provides the necessary information collected and the calculators developed by the major organizations in the field. This model integrated with the cybersecurity solution uses consolidated factors that have a significant impact on the data breach risk. We propose mathematical models of how the factors impact the cost and the likelihood. These models allow us to conclude that results obtained through the models mitigate the data breaches in the potential and future business system dynamically.

1. Introduction

While some researchers have evaluated main vulnerability discovery models by using actual data for different operating systems [1], other researchers have assessed the major effects of the exploitation of those vulnerabilities and data security breaches.
It is now known that no organization may be immune to data breaches and that when breaches occur, they can have major consequences. The data breach may be looked at differently in different fields. Any security violation action on the protected data which results in the release of the data to unauthorized entities, could be considered as a data breach. The security violation may be a result of a cyber-attack, theft or loss of devices, theft or leak of the employee data, such as security credentials, and human errors. In industrial and business systems, the main cyber-attacks include SQL injection, cross-site scripting (XSS) and privilege escalation. SQL injection is one of the most common attacks that might destroy a database by the placement of a crafted malicious code in SQL statements via a web page input.
There have been many widely discussed data breaches in recent years. The published reports suggest widely different estimates of the costs. The different estimation methods lead to considerable confusion and disagreements. Therefore, it is important to develop a systematic and consolidated estimation model that will assist in a reliable determination of the quantitative estimates. This is important because of the economic impact on not only the shareholders’ stakes in an individual organization but also the society as a whole. In the quantitative assessment approach, the calculation of overall costs depends on the direct and indirect costs.
A systematic understanding of the costs of data breaches can aid in the optimization of the data breach response plans. According to a Symantec/Ponemon Institute study, this can potentially lead to a reduction of up to 47% in the costs related to the breaches [2].
A formal quantitative model that takes a systematic approach for the estimation of the total cost based on the number of records and other factors is required. That model should reflect actual field data and should be based on realistic assumptions. As discussed later, the model includes economy of scale since the metric data breach cost per record is found to be misleading [3]. In addition, a quantitative model for the probability of a breach during a one-year period is an important part of estimating data breach risk. Quantitative risk assessment takes into consideration all the risks related to the information technology systems where data are securely stored or handled.
Layton and Waters [4] have estimated the tangible and intangible costs of data breaches for Telstra and LinkedIn. They only consider labor costs as tangible costs and reputation loss (stock price movement after breach) as intangible costs.
Recently, Algarni and Malaiya have proposed an approach for consolidating the factors that influence the cost [3]. They have examined all the factors that impact data-breach risks incorporated in all the available data breach calculators and have removed the factors that are redundant or are not significant enough.
In existing models, the cost of security breaches is not appropriately calculated, because important aspects of estimating data breach risk are not considered. Although the levels of security solutions and the number of secure deployments have increased, the cost of the security breaches, which is growing linearly, is manageable. In order to quantify how a model performs in describing the data, we calculated the R-squared value, which gives an indication of how well the model fits the data. Using the power regression model, the computations of the cost calculations involved with a data breach can be improved. If the simplicity of the power regression model requires fewer computations with less complexity, the R-squared value will be better. The result will be between 0 and 1, with 1 or very close to 1 representing a perfect fit of the data. In a correct model, the regression line should have an upward slope, which suggests that abnormal churn and per capita costs are linearly related. One goal of this research is to develop a systematic model that provides insights into characteristics upon which the cost of a data breach can be based.
Using the data provided by the Ponemon Institute, we concluded that our portrayal of Ponemon’s model as simple is both accurate and entirely fair. In this analysis, we show that the approach used by Ponemon is not only overly simple but also misleading; it may even be harmful to organizations using the Ponemon research in their risk analyses. Using only the number of records lost in a breach is not an accurate indication of the impact of that breach. However, this model has an advantage in its simplicity. The end-user can multiply the number of records in their system by a fixed dollar figure and get an estimate of loss.
In this paper, we propose computational models for both the cost and likelihood of security breaches. The cost is divided into a few partial costs, and a model is proposed for each. The proposed model is based on the available data; it formalizes and consolidates the computational approaches used by the existing calculators. A preliminary modeling approach had been proposed [3] using a linear relationship between the breach size (number of records involved in the breach) and the cost of the breach. A careful examination of the data (when the breach sizes span several orders of magnitude) suggests that a power regression model (considered here) is more appropriate than a linear model.
Quantitative assessment of cybersecurity risks for managing security costs and mitigating data breaches in the business system allows us to maintain the security issues of data management considered in the business environments. Cybersecurity risks are studied using datasets related to cyber-attacks, which occur in many data handling organizations.
The paper is organized as follows. Section 2 presents the literature review. In Section 3, the applicability of the existing models is examined. Section 4 presents an estimation approach using an economy of scale since the concept of cost per record is misleading for breaches of different magnitudes. In Section 5, a formal model for data breach costs is introduced. In Section 6, an approach for estimating the likelihood of a data breach within a year for an organization is discussed. Existing challenges and limitations are discussed in Section 7. Finally, in Section 8, conclusions are presented with further work.

2. Literature Review

According to [5], the requirements of security against data breach risk, challenges of securing health-related data, and existing security techniques are important and provide rudiments for the investigation of security management for analyzing data security and privacy. Requirements depend on the changing laws of health-related data, ethics of human life, and health domains. The number of issues in the security challenges is growing, because the health data handling with emerging technologies is not kept in one place for the health analysis. In this challenge, managing health data with computing is one of the potential security and privacy issues. Additionally, other related challenges are legal and ethical compliance, consent management, etc. This research takes cryptographic security, blockchain-based security, access control and security analysis, and network security into consideration for improving data security solutions.
Some of the latest details of the data-related costs are given in [6], as illustrated in Figure 1 and Figure 2. Many attestations contain information about confidential messages and the future occurrence of specific types of security breaches [7]. In the case of inefficient data handling, a security breach can lead to damage to the potential data management systems, which includes the misstatement of accounts that are affected by the breach. Entertainment, public, and consumer industries had the highest percentage of data breaches caused by human error.
According to [8], information security culture affects data breaches through human behavior in organizations where threats of human to information protection are increasing. To solve these problems, some security-related factors were investigated. As a result, the factors that could positively influence an information security culture were identified, consolidated, and expanded to five external factors and twenty internal factors.
To analyze quantitative aspects, valance (intensity) and contingency (interrelation) analysis are briefly considered with other comprehensive models [9]. For information security based on the comprehensive model, not only relevant information without data breach has to be clarified, but also their other security issues have to be considered.
Definition of attacks and breaches based on cost models are analyzed in [10,11,12,13] for improving the overall cost of the security problems and detection challenges and impacts of breaches. These models allow business managers to analyze the quantifiable and comparable evaluations of cyber defense capabilities.
According to [14], IoT privacy and security have been investigated through many attacks. These include eavesdropping, spoofing, RF jamming, Sybil attack, sinkhole attack, etc. DoS attacks nowadays have become sophisticated because these attacks affect security management. A DoS attack may offer a smokescreen to carry out a parallel attack to intrude into an information security defense system and breach the privacy of the users by gaining access to the data.
Information security and data breaches are critical problems for public and private organizations where security breaches affect business dealings, damage security management, and create financial losses [15].
The work in [16] has covered cost optimization schemes using security vulnerability measurement for enhancing efficient security, which reduces security management. The security assessment methods and budget allocation methods allow the security managers to improve the cost optimization with minimum risk.
The authors in [17,18] have developed a quantitative framework for assessing the risk management and the vulnerability of the ecosystem. They introduced the response-based quantitative assessment method. In some specific applications, semi-quantitative approaches can be used for assessing the risk of groundwater vulnerability.
Among all data breaches in the potential systems, security of the health-related data may be considered the most important and influencing factor on the business systems. The security of health-related confidential data cannot be overemphasized [19,20]. Privacy-preserving techniques for genomic data support the privacy and security problems related to genomic data sharing/computation [21].

3. Applicability of Existing Models

Although previous researchers discussed many models for creating security solutions, an efficient model for preventing data breaches and cyber-attacks is still being investigated. As reported in [3], there are two main computational models, each with its own set of data: NetDiligence, which created the Hub International calculator (2012) and contributed to the Verizon report, Ponemon, which created calculators with sponsorships from Symantec (2010), Megapath (2013), and IBM (2014). However, no critical studies of these two approaches have been conducted. In addition, we examine the claims made by Jay Jacobs of Verizon. He collaborated with NetDiligence [22], and has been critical of the computations model used by Ponemon because the Ponemon approach yields a cost per record that he believes is too high.
The difference between the two models is readily illustrated using the average cost per record implicit in the two approaches. The cost per record of customer personally identifiable information (PII) increased to USD 175 in breaches caused by a malicious attack. As shown in Figure 2, the per-record cost of customer PII was USD 175 in malicious attacks during 2020, nearly 17% more than the overall average per-record cost of customer PII (USD 162 per record) compromised in any type of breach.
PII is a value that represents the personal cost and the personal share of the breach, and it includes records containing a customer’s personal information. The cost per record of PII increases with malicious attacks and data breaches. In the previous work by various researchers that we studied, PII was not determined appropriately because the existing models did not have enough relevant data. Eighty percent of the breached organizations stated that the customer’s PII was compromised during the breach, far more than any other type of record. As in [6], the average cost in 2020 has decreased, and it is further decreasing in 2021 because of improvements in cybersecurity solutions. Costs have also decreased because information systems in the organizations are securely maintained with all available resources. In an organization, security risks create loss and increase the cost per record. Security risks may come from external hackers, staff mistakes, malware or viruses, and ransomware. When a model that does not count all proactive risk details is used, it may end up causing a huge loss to the organization, and its data and calculations will be misleading.
By using the Ponemon formula (all costs of data breach divided by compromised records: USD 400 million/700 million records = USD 0.58), the average cost per record in the 2015 Verizon Data Beach Investigations Report (DBIR) is USD 0.58 [23]. The magnitude difference of two to three orders of magnitude raises several questions.
Both organizations make extensive and varied use of datasets. Ponemon gathered information from over 1600 business companies across several countries. Data from 191 cyber insurance payouts were included in the NetDiligence data from the 2015 Verizon (DBIR) [23].
We can compare the cost per record with the available numbers for the Target and the Home Depot breaches, which come out to be USD 6.30 and USD 1.13 per record, respectively. In December 2013, Target Brands Inc. experienced a significant data breach involving 40 million credit and debit card records [24]. The overall cost of the data breach was reported to be about USD 252 million, based on Target’s financial statements [25,26]. These estimates numbers are nearer to the NetDiligence numbers. Since no lawsuit has yet been filed, the findings are close to Hub International’s estimate (Table 1) if we deduct the estimated lawsuit cost (USD 12.57 − 7.09 = USD 5.48). This breach’s cost per record is not even comparable to Ponemon’s cost per record.
The other notable example is that of the Home Depot data breach in 2014, which involved 56 million customer payment cards [24]. The available information about the cost of this breach is given in [27,28]. We found that the cost per card was USD 63 million divided by 56 million, which equals USD 1.13. This cost is much smaller than what the Ponemon calculators would expect, and it is actually closer to the Hub International estimate.
There are two apparent sources of the discrepancy:
  • What is included in the data breach cost: Intangible costs, such as reputation loss and its effect on the business loss, are included in Ponemon costs. These costs are not included in NetDiligence. Furthermore, NetDiligence uses insurance claims as a cost measurement. The insurance claims, it has been argued, only reflect the costs covered by the insurance purchased [29]. Nonetheless, the insurance coverage should be of the same order of magnitude as the actual cost. The cost of a lost reputation can be difficult to measure. Recent attempts to calculate it using stock price as a metric seem to indicate that the effect may be minor in several cases, and that the effect may be masked by more important factors in stock price movement.
  • The data breach sizes: The fact that total cost is unlikely to be proportional to the number of records involved is most likely the major contributor to the cost per record discrepancies. The average number of records used in the Ponemon report in 2015 was 28,070, with no more than 100,000 records in total, while the NetDiligence data includes breaches involving far more records, with the average breach involving 3,166,600 records [30]. There are two reasons for this: some costs of data breaches are largely constant and independent of the affected records number. As a result, for a greater number of records, the cost per record will be lower. Even if the cost rises in tandem with the number of records, economies of scale come into play. An organization that encounters a significant number of data breaches should be able to manage them more cost-effectively and receive better prices from recovery service providers. According to a 2015 Verizon report, the average cost per record for 100 lost records was USD 254 because the expected breach cost is USD 25,445, but the cost was just USD 0.09 per record for 100 million lost records because of the expected breach cost is USD 9 million [23]. As a result, cost per record alone is considered to be a misleading metric.
Our analysis of the Hub International calculator, which uses NetDiligence’s data breach cost data, suggests that it assumes a linear trend. On the other hand, the calculators that rely on Ponemon data, where the number of breaches does not exceed 100,000 records, the trend is not linear [22].
We thus propose a model that is non-linear relative to the number of records since a linear model implies that there is a cost per record that is meaningful.

4. Economy of Scale

Since the cost per record is misleading when it comes to estimating the data breach cost, the economy of scale concept will assist in making the cost per record consistent with other factors instead of the constant cost per record that is obtained by dividing the total breach cost by the total breach size. Therefore, using the economy of scale is important in order to remove the correlation between the high breach cost and breach size and ensure that the relationship relies not only on the cost per record factor only but also on other factors. For example, cyber-attacks and data breaches decrease profits and affect the global economy. The data breach is one of the fastest-growing crimes and has increased in scale, cost, and sophistication, posing a major threat to both businesses and individuals. Some of the cyberattacks that cost a fortune and affected the global economy include Epsilon, WannaCry and Petya.
The current issue is that the total breach cost increases when the size of the data breach increases. To investigate this issue, the concept of economy of scale should be considered for analysis, along with actual data. This concept is defined as a decrease in the average long-term costs resulting from an increase in the size of the operating unit [31]. As is depicted by the data [2,32], many organizations have disclosed that their business has been affected by data breaches and cybersecurity attacks. These organizations depend on data management which is influenced by the costs of the data breach. Therefore, we present two hypotheses:
  • The overall cost rises with breach size.
  • For larger breaches, the breach cost per record will decline. Thus, the overall breach cost will rise less than linearly.
Although the economy of scale depends on the increasing breach cost, the larger breach may be simplified with cost per record. The cost per affected record declines when the number of affected records (breach size) of the whole data breach is too large because we have to divide the total cost by the number of affected records. According to the concept of economy of scale, the cost of development per unit decreases as the number of records increases. Therefore, the relationship variables are the number of affected records and the cost per record.
A residual analysis suggests that the trend appears to change slightly for record sizes greater than about 25,000. This suggests that the model may be amenable to further refinement. Perhaps a piecewise regression may yield better accuracy, which may be addressed in future research. The reason is that the two data collection approaches are different. The Verizon/NetDiligence data are based on insurance payments, while the Ponemon data include more complete costs such as opportunity costs.
As the global economy relies more and more on information technology (IT) based on the Internet of Things (IoT), the economy of scale will depend on greater usage of secure connections. With the growing scalability of IoT and emerging technologies such as IoT-based IT, interconnectedness, cybersecurity threats pose an increasing challenge. Figure 3 depicts the relationship between abuse, attack, cybercrime and data breach.
According to [33], a data breach is involved with the abuse, attack, and cybercrime (CCr) as shown in Figure 3. Abuse encompasses any negative and/or undesirable use of technology that affects the breaching and cost of the breach. An attack refers to a deliberate unlawful action that perpetrates the breach or physical action targeted against another party. The CCr results from any illegal use of technology and procedures which results in an unauthorized breach.
Figure 3 examines the problems posed by abuse, attack and CCr as well as how the public perceives the security issues and how this, in turn, affects their data breach, trust and business engagement with the security technology. Cyberattacks and CCr are both categorized as abuse. However, a cyberattack will be considered a cybercrime according to the jurisprudence of the applicable law at the premises of the attack. Misuse of legitimately assigned permissions could be categorized as abuse and cybercrime, but it may not constitute an attack.
Further exacerbating the problem, organizations may not invest in social activities rather than cybersecurity solutions. Cyberattacks and data breaches on private individuals and on other organizations are not considered seriously. These security issues in private and public organizations raise social costs as the technological resource stock externality is exacerbated. Since there are several factors that impact the overall breach cost, it is to be expected that there would be a significant variation that is not explained by breach size alone. For very small breaches, the fixed costs would dominate, and thus the trend would not be clearly visible.
The regression model for calculating costs is important because it helps determine which risk or breach factors matter the most, which can be ignored, and how these factors interact with each other. In this model, regression analysis lies in the fact that it provides a powerful statistical method that allows an R-squared value to examine the relationship between two or more variables of interest used in the calculator.
The actual computation of R-squared requires several steps. These steps include taking the data points of dependent and independent variables related to breach costs. Using a statistical computation, these data points allow finding the line of best fit and R-squared values that are determined from a regression model. From there, we would calculate predicted values, subtract actual values, and square the results. This process yields a list of errors squared, which is then summed to equal the unexplained variance. To calculate the total variance, we would subtract the average actual value from each of the actual values, square the results, and sum them. From there, we would divide the first sum of errors (explained variance) by the second sum (total variance) and subtract the result from 1. These calculations provide the R-squared value.
R-squared correlates the changes in a dependent variable with those in an independent variable. It does not by itself tell whether the chosen model is good or bad, nor does it tell whether the data and predictions are biased or not. Specifically, a high or low R-squared is not necessarily desirable, because it does not convey the reliability of the model. Similarly, its value does not explain whether the regression is right. A good model can yield a low R-squared value. Likewise, a poorly fit model can result in a high R-squared value.
What qualifies as a good R-squared value depends on the context. In some disciplines, such as the social sciences, even a relatively low R-squared such as 0.5 could be considered relatively strong. In other fields, the standards for a good R-squared reading can be much higher, such as 0.9 or above. In finance, an R-squared above 0.7 is generally seen as showing a high level of correlation, whereas a value measured below 0.4 is considered to show a low correlation. This is not a hard-and-fast rule, however, and it depends on the specific analysis.
Table 2 gives the values of the two parameters for the Ponemon 2013, Ponemon 2014, and NetDiligence data. According to the latest report of NetDiligence published in 2020, cyber claims studies and cybercrimes (ransomware, business interruption, social engineering) also depend on these parameters. As observed above, the parameter values for the two Ponemon datasets are close, suggesting that the two datasets, while distinct, were collected using the same approach. The NetDiligence data yields somewhat different values, which is likely due to the fact that the numbers were collected differently.
Based on the available datasets, a model of the total breach cost (y) after incorporating economy of scale can be formulated as below:
y   = ax b
where a and b are applicable parameters, and size x refers to the breach sizes bigger than or equal to 1000 records. (Equation (1) is not applicable to the cases where a smaller number of records is affected.) The cost per record (CPR) after incorporating economy of scale is obtained by dividing (1) by the breach size, which yields,
CPR   =   ax ( b 1 )
The two hypotheses mentioned above are both supported by the three datasets. The parameter values in (2) should conform with how the numbers are to be interpreted.
Sample size justification is considered for existing and proposed models. Effect size has both theoretical and practical considerations. If the effect size is not known, it can be calculated from the mean and standard deviation values. The practical aspect of justifying the sample size is the monetary cost and the time needed to collect the data. Nonlinearity is caused by the economy of scale; thus, b should be <1. The size of the data breach is positively associated with a higher negative return on the short-term market value of the breached company. Although Table 3, Table 4, Table 5, Table 6, Table 7 and Table 8 allow us to analyze the justifications of the models given in (1) and (2), the average cost in 2020 is better as given in [6].

5. Comprehensive Cost Computation Model

A comprehensive model for a data breach cost and hence the cost of annual security is shown in Figure 4. It incorporates the concepts from the current computational models. Some data breach costs are direct financial expenses, and indirect costs such as the time, effort, and others according to Ponemon Institute terms. Therefore, there are five partial costs that comprise the total data breach cost: incident investigation, crisis management, regulatory and industry sanctions related to governmental procedures, a class-action lawsuit, and opportunity cost.
The total security cost is made up of two parts: the total direct cost of a data breach and the cost of security maintenance and upgrades, which would be required even if the breach had not occurred. These two costs participate in an organization’s expected annual security cost (3) in the event of a security data breach. Expected annual security cost (ESC) is the addition of annual expected cost due to breaches (EB) and cost regardless of any breaches (RB).
ESC   =   EB + RB
The overall risk evaluation model, as in Figure 4 allows us to analyze the cost of the data breach through the available data. Many risks influence the costs of a data breach, including various types of security technologies and practices.
The expected annual cost of potential data breaches is determined by the probability of a particular type of data breach (4). Therefore, if there are n types of data, EB is the multiplication of the likelihood of data breach type (Pi) and the total cost per breach for type (Ai).
EB = i = 1 n P i A i
The expected costs due to the breach could cover the past data breach that occurred or the data breach that could occur in the future. For the past breach, the data breach probability is 1, and the actual cost of a data breach is computed normally. However, for future data breach, the data breach probability is less than 1.

5.1. Compiled Cost Data

As mentioned in [3], we analyzed the available calculators that estimate data breach risks. We studied the Hub International Calculator to collect actual data such as a and b parameters by using the power regression equations that computed partial costs but did not calculate the probability. The IDT911’s calculator was popular in 2016 and is considered as examples for tables in this paper. The presented costs for each option can be calculated for future recordings. These costs are part of the total breach cost, but such small figures may not be the appropriate method for the estimation of the breach cost. With the IBM/Ponemon calculator, the details of the cost per record and the probability of breach which may occur within the next 12 months are provided. However, IBM/Ponemon does not publish how it estimates each cost per record for each option that is chosen for different factors. Our proposed model is based on the numbers of the Hub International calculator since it was obtained by our analysis, and the IBM/Ponemon calculator provides the multiplier factor values that represent the variation between options.
The interface of, a, b, cost per record, partial cost per breach, and the probability is shown in (Table 3, Table 4, Table 5, Table 6, Table 7 and Table 8).
Two types of data breaches are used in the personal security system: they are personal health information (PHI) and social security numbers (SSN). Although credit cards (CC) provide personal security information, they secure financial transactions in many different ways for various business organizations. Many public organizations use the PHI and SSN for validating the personal information before they accept the CC.
We ignore three factors during the estimation of partial costs per record for several reasons. For instance, factor 3 is ignored since its data about costs and probability are redundant and are overlapped with factor 2, which is industry classification. In addition, we ignore factor 10 in the incident investigation cost classification during the estimation of that cost because the estimation of the breach cost is small and might be insignificant, but we use this factor when we compute the cost per record (CPR). Moreover, factor 12 is redundant, as it is similar to factor 1. Therefore, we ignore it because its impact of more headcount will equal the impact of more breach size. Below, different cost components are described briefly.

5.2. Computation of Factors

Our model of data breach cost per record and the probability uses the “multiplicative model” approach similar to the other quantitative models such as the defect density models by Chulani and Boehm [34] and Malaiya and Denton [35], software cost estimation model by Barry Boehm et al. [36], and MIL-HDBK-217 Chip failure rate model [37]. This multiplicative model illustrates the variation between the selected options of each factor for data breach cost and probability when the user chooses one.

5.3. Security Costs Due to Data Breach

Some partial costs contribute to the total data breach cost. These costs are impacted by two factors: affected records number, and the type of data breach. The partial costs per record equations are presented after incorporating the economy of scale. Then, we can obtain the partial breach cost by multiplying the cost per record with the breach size. The partial costs include the costs described in the following subsections.

5.3.1. Incident Investigation Cost

The incident investigation cost includes all costs associated with assisting the organization in detecting the data breach [38]. Forensic, investigation, and consulting services, as well as assessment and audit services and technology staff costs, are examples. We use the factors’ values to note the variation between options in the data of IBM/Ponemon. The investigation cost per record (ICPR) shown in (5) depends on cost factors 4, 5, and 6 considered in Table 5.
ICPR   = [ ax ( b 1 ) ] ×   F BC × F E × F P
where the values of a and b can be selected from Table 5. The cost factors used in (5) are costs due to data breach causes (FBC), sensitive data encryption (FE) and organization’s privacy (FP) respectively.
According to [6], security details of incident investigation costs in 2019 and 2020 show that many organizations have spent less money than the previous years. Although remote work during COVID-19 increased, the data breach costs and incident response times (IRT) decreased thereby reducing average data breach costs. By combining testing with IRT, organizations can reduce the cost of a data breach.
The causes that lead to a data breach have a different impact on the cost of a data breach. The expected cost in the case of a malicious attack is higher (factor 7), as seen in Table 5. Table 9 gives the values for this factor, where “Don’t know” is the default case. The encryption of sensitive data on laptops or removable storage (if applicable) costs the organization less if the organization has a data breach, but it costs more if the data are not encrypted. The values for this factor are shown in Table 10.
The privacy and the protection of data have a huge effect on the data breach cost based on the fact whether they are applied or not. The factor values can be obtained from the cost factor of the organizations’ privacy reports.

5.3.2. Crisis Management Cost

The activities that enable the organization to warn the public that personal information has been lost or compromised are referred to as crisis management [38] and manage the impact of the current data breach. For example, in the case of a credit card company, these activities include notifications, credit tracking/monitoring, and reissuing credit cards (if any). The organization that is affected by the data breach may not be responsible for the expense of reissuing the cards, but rather the bank that issued the card will bear the cost based on the current rules. The crisis management cost per record (CMCPR) allows us to estimate the crisis management cost with cost factor 11 and is given below.
CMCPR   = [ ax ( b 1 ) ] ×   F BCM
where the values of a and b can be used from Table 6. In (6), the cost factor 11 related to the values of the team of business continuity management (FBCM) is discussed and shown in Table 11.
This team usually knows how to detect the data security risk in the organization, and it has an emergency plan to deal with a potential breach. Therefore, the existence of this team in the organization will reduce the data breach cost.

5.3.3. Regulatory and Industry Sanctions Cost

This cost relies on the Payment Card Industry (PCI) compliance. Fines and penalties will be placed on the PCI organization if it is not compliant. The sanctions cost per record (SCPR) depends on factor 14, which is in Table 7. The regulatory and industry sanctions cost is estimated as below:
SCPR   = [ ax ( b 1 ) ]
where the values of a and b can be chosen from Table 7. Regarding the cybersecurity risks, the PCI industries have used (7) and verified the cost analysis of SCPR in recent years up to 2020.

5.3.4. Class Action Lawsuit Cost

The organization will undertake several costs due to litigation, legal defense, damages, and others, if a federal class-action lawsuit is filed. When we calculate the class action lawsuit cost per record (CALCPR), factors 15 and 16 should be considered from Table 8 The class-action lawsuit cost is estimated as follows:
CALCPR   = [ ax ( b 1 ) ]
where the values of a and b can be used from Table 8, quantitative assessment of cybersecurity risks. This depends on many factors, including CALCPR. It is to be noted that SCPR cost in (7) and CALCPR cost in (8) are calculated in a similar manner. However, parameters a and b are chosen differently in both cases.

5.3.5. Opportunity Cost

It is also known as lost business costs, which are incurred as a result of lost business opportunities and reputation after disclosure of a data breach to victims and the public in the media [38]. This can be difficult to estimate since determining the precise opportunity loss caused by the breach can be hard.
It has been debated that the data breach will affect the organization’s stock price. Although some previous research indicated that there is a substantial effect on stock price, a more recent study cast doubt on this. This may be because data breaches are thought to be widespread [39]. The effect on the stock price is determined by the relationship between the overall cost of the data breach and the company’s annual revenue. If the data breach cost is minimal, the breach would have little effect on stock prices.

5.4. Computation of Data Breach Cost

To calculate the total data breach cost (CPR) for each compromised record, we combine all the partial costs for the type of data breach. Then, we can use the values of some factors that impact the total breach cost per record by using the data from the IBM/Ponemon calculator that is shown in Table 4, Table 5 and Table 6. These values are used as a variation measure when the user chooses options for those factors. The expression of the cost per record is given by:
CPR i = F C × F I × F D × i = 1 4 c i
where the factors impacting the cost per record for type i are the country of an organization that had a data breach Fcountry (FC), the organization’s industry classification Findustry (FI), and the duration that the business keeps the sensitive information of employees, customers, and patients Fduration (FD).
These factors will be multiplied by the total cost per record of the four partial costs that include incident investigation, crisis management, regulatory and industry sanctions, and class action lawsuit. Each factor has a default value that is equal to one. Each factor is discussed below.
Cost factor based on FC depends on the organization’s country and countries for which data breach cost data were collected in the IBM/Ponemon 2015 Global analysis [40]. We take the USA as the default choice. The cost in some countries is significantly lower. Then, we use a weighted cost/factor for the rest of the countries relative to the cost per record for the US, which is USD 217.
Cost factor FI represents the organization’s industry classification. This factor takes into account different types of industry classifications. Some of the classifications have a bigger effect on the breach cost per record than others. The values of the factor of industry classifications are shown in (Table 12), and the default value is one.
Cost factor FD focuses on sensitive information keeping. This factor takes into consideration the fact that the businesses keep some information about their employees, customers, and patients for different lengths of time. The cost of the breach will depend on the length of time this information is retained. We determine how many months approximately are in each duration. The durations are as follows: 3, 12, 48, 72. Then, we make 48 months as the default one. After that, we plot the months with cost, make a trend line, and obtain the expression: y = 37 * months + 317. In addition, we normalize that expression by dividing all values by 2000, which is the cost of 48 months (the default). The expression becomes: y= 0.0185 * months + 0.158. The values of a factor are found by dividing the cost of each duration by 2000 that is the cost of 48 months. The values are presented in (Table 13).
The cost of the data breach not only depends on the duration but also the volume of the sensitive information that is vulnerable to a breach and which should be protected using encryption [6]. After calculation of the cost per record, the total cost due to breach for type i ( TB i ) can be computed by multiplication of the cost per record by the number of affected records (x) as shown in (10):
TB i =   CPR i     x
The cost of protecting sensitive data in a cloud environment using policy and technology increases with the security level and the level of the sensitive information.

5.5. Security Costs Regardless of Data Breach

An organization takes steps to reduce the risk of data breaches based on the organization’s size and the potential security risks. The indirect data breach costs comprise recurring costs of the security measures and security upgrades. Upgrading means bridging internal security holes to protect the organization against data loss or harm. Such security upgrades minimize the data breach probability, and then the cyber insurance at one time.
In general, it is difficult to obtain the essential information on the costs due to security upgrades because these upgrades happen internally, and organizations do not disclose the details. As a result, developing a preliminary economics model to estimate the cost of a security upgrade for an organization is still an open issue. However, some security-related cost information can be obtained from some occasionally published articles. For example, LinkedIn spent between USD 2–3 million in 2012 to prevent password theft [41].
These costs can be hard to calculate for departments in small organizations because each staff member spends time, which is hard to measure, engaging in serval tasks such as installing security patches, configuring systems and applications to improve security, and managing system behavior in response to a security breach.
In order to calculate the cost regardless of a data breach (CRDB), we should add the following costs: the security maintenance cost (SM), security upgrade cost (SU), and an insurance premium (IP). Equation (11) shows how to compute the elements that comprise general security costs for any organization.
CRDB   =   SM + SU + IP
The effectiveness of security processing and automation of SU on data breach costs enhance the SM. Deployment of security levels varies with many factors; some of these factors are IP, security tools, trust security models, etc.

5.6. Cyber Liability Insurance Coverage

Cyber liability insurance is also known as data breach insurance. It provides the required coverage after a data breach occurs resulting in a data loss. This coverage by insurance companies is partial. In the current days, the demand for cyber insurance has increased since the number of data breaches has also increased [38]. There are several cyber insurance companies that cover the first-party costs and third-party costs of the data breach. Cyber insurance is becoming the main element during cyber risk management, especially through data breach risks. Thus, cyber insurance is an essential part of a data breach incident response plan that assists in minimizing the organization’s damage, liability, and performance. Therefore, cyber insurance can cover any business loss and reduce the impact due to a data breach.
The cost of cyber insurance and its coverage vary depending on how the cost is accounted for by the organization’s agenda. Sometimes, the insurance cost is considered a security cost, and other times it is simply considered a cost of doing business. Insurance coverage needs further analysis and investigation in the future.

6. Modeling Data Breach Probability

The organization’s data breach probability relies on some factors: internal [vulnerabilities (if any) that could contribute to a data breach and if they are still open, which would mean that there is inadequate protection], external (attacker motivation and capabilities), or Bayesian (previous breaches can indicate weaker security unless security is dramatically improved as a result of a breach). It is worth noting that some factors that are considered by the Ponemon Institute to influence cost can also be considered to influence likelihood, such as BCM team and data encryption.
There are two main factors to predict the data breach probability: number of affected records, lost or stolen, and industry classification of organizations that is considered a factor under the classification of data types of breach. We extracted the probability data from the 2015 Ponemon report [40]. We find that the probability is computed from the size of the data breach and from the country as shown in (Figure 5 and Figure 6). The expression for the probability of data breach based on the breach size as given in (12) is based on the data points in Figure 5 using a trend line for the data. In (12), the probability P A represents the annual data probability calculated over a period of 12 months or a year.
P A =   α e ( β x )  
where, α = 0.4405, β = 4 × 10−5, and x is the breach size. After studying the probability of data breach, we found that most researchers estimate the probability based on limited methods, such as surveys and collecting experts’ opinions like the Ponemon estimation. Some researchers do not discuss how the probability is computed.
Ponemon calculators (Symantec and IBM) use a survey with questions that we identify in this paper as factors to examine the cost and probability incurred by organizations after experiencing data breach incidents. We calculate the probability of data breaches for different periods. The probability of a breach of data type i ( P i ) calculates the data breach probability (13) for the organization in the next 12 months:
P i = F C × F BCM × F I ×   F BC × F E × F P × α e ( β x )
where α = 0.4405, β = 4 × 10−5, x is the breach size, and the F factors are the six factors that impact the data breach probability. In (13), many probability factors are considered and discussed for calculating the P i in different data types. These factors are the country of the organization that had a data breach FC, the organization’s business continuity management team involved in the data breach incident response process FBCM, the organization’s industry classification FI, and the most likely cause of a data breach FBC, the sensitive data encrypted on al laptops or removable storage FE, and the organization’s privacy and availability of data protection program FP. The factors are multiplied with the probability obtained using (12). Each factor has a default value that is equal to one as well. Each of these factors is discussed below.
Probability Factor of Organization’s Country (FC): Like the data breach cost, the probability of a data breach is impacted by the country where the data are located. The country-based probability factor data are taken from the 2015 Ponemon report [40]. We take the USA as the default choice. Then, we use a weighted factor for the rest of the countries based on the probability for the US, increasing each year by a small percentage (0.2–0.3%), as presented in [6]. France and Brazil have a relatively higher probability of a data breach.
Probability Factor of Business Continuity Management Team (FBCM): This factor is essential to identify the potential threats faced by the organization and the impact that comes from these threats. Therefore, this factor has a different impact based on whether or not the team is involved in the data breach incident response plan or not. (Table 14) shows the values of the factor for different scenarios.
Probability Factor of Organization’s Industry Classification (FI): The different industry classifications also contribute to different probabilities of a data breach, as well as the cost of the data breach. The factor values and data from any organizations’ business report allow researchers to calculate the F I as given in [42].
Probability Factor of Data Breach Causes (FBC): The probability of data breach varies based on the reason due to which the data are breached. Table 15 shows the possible values of this factor.
Probability Factor of Sensitive Data Encryption (FE): If the sensitive data on the laptops or removable storage are encrypted (if applicable), that lowers the probability of data breach compared to data that are not encrypted. The possible values of this factor are presented in Table 16.
Probability Factor of Organization’s Privacy (FP): The private and public enterprises expect to provide higher privacy, security, and reliability for mission-critical services through network slicing, which supports to lower the data breaches with appropriate F P and factor’s values. The forms of applied privacy in an organization will impact data breach probabilities. Therefore, if the organization has strict privacy, the probability of data breaches will be lower.
Our proposed model reveals that there is an average probability that the annual cost of a data breach enhances with a few percentages (<1). However, overall security in 2020 is improved within the organizations.

7. Challenges and Limitations

Companies that have experienced data breaches frequently do not publish details on the real costs of damage, though some figures do appear in reports. The Ponemon Institute and NetDiligence collect proprietary information and publish an annual summary report. Thus, our analysis has focused on the published reports and the news reports. Cost estimates for data breaches differ from one source to another. We attempted to clarify and address the obvious discrepancies. We develop our model of computational components to ensure that it makes realistic assumptions backed by data from multiple sources.
The calculators of data breach cost are considered an important step towards estimating breach costs in a systematic way. However, these are primarily designed for online estimation for particular cases and are intended to be used for the promotion of security-related services. In certain cases, we must obtain computational results by filling in the calculator inputs at various steps, and the calculator will then send us the results. The computation methodology, however, is not disclosed. The cost per breach is usually given though for particular chosen values for a factor in most calculators. The values returned are often not broken down into cost components; for example, the Hub International calculator only produces the cost per breach. Moreover, some of the calculators, such as CyberTab, do not use any underlying data to measure the cost of security breaches, and the users have to mention the data breach cost themselves to estimate the cost. Thus, some of the calculators provide little information that would allow the construction of an accurate model for the cost of data breaches.
According to [43,44], the costs of cybersecurity issues around the world are increasing continuously with many factors. Cybersecurity risk management decisions require the knowledge of evolving threats within the organizations through the use of technology and security measurements applied during the data management. For the calculation of the cost of security management, the factors such as the definition of the cyberattack, behavior of the organization, and requirements of technology impact the outcome for an organization. Regarding technical perspective, cyberattacks (e.g., financial, espionage) need to be prevented through intelligent security management.

8. Conclusions and Future Works

There exist significant variations in how the costs of specific breaches should be computed and how the associated risks can be estimated. In this study, we developed a systematic model for this purpose based on available data and existing approaches. The model uses the factors that are found to be significant. We consider the economy of scale, as observed in actual data, to develop the model relating the cost to the number of records. We also consider the factors that may impact the probability of a breach.
We identify several issues that need to be addressed by further research. We need to develop a model that can estimate the costs regardless of the data breaches, such as upgrading and maintenance costs. In addition, we need to develop more detailed approaches for estimating and validating data breach probabilities. We did not consider the insurance payouts to cover security breach losses or the insurance premium costs. They need to be addressed separately in detail. The proposed model can be implemented using a suitable interface with the capability to update the parameters as further data becomes available.

Author Contributions

Conceptualization, A.M.A. and Y.K.M.; Formal analysis, A.M.A.; Investigation, A.M.A. and V.T.; Methodology, A.M.A.; Resources, A.M.A. and Y.K.M.; Supervision, Y.K.M.; Writing original draft, A.M.A. and V.T.; Writing—review & editing, V.T. and Y.K.M. All authors have read and agreed to the published version of the manuscript.

Funding

This study was funded by King Abdulaziz University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This project was funded by the Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, under grant no. (J-467-611-38). The authors, therefore, acknowledge with thanks the DSR for technical and financial support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alhazmi, O.H.; Malaiya, Y.K. Application of vulnerability discovery models to major operating systems. IEEE Trans. Reliab. 2008, 57, 14–22. [Google Scholar] [CrossRef]
  2. Ponemon Institute. 2013 Cost of Data Breach Study: The US Sponsored by Symantec. 2013. Available online: http://www.symantec.com/content/en/us/about/media/pdfs/b-cost-of-a-data-breach-us-report-2013.en-us.pdf (accessed on 30 March 2021).
  3. Algarni, A.M.; Malaiya, Y.K. A consolidated approach for estimation of data security breach costs. In Proceedings of the 2016 2nd International Conference on Information Management (ICIM), London, UK, 7–8 May 2016. [Google Scholar]
  4. Layton, R.; Watters, P.A. A methodology for estimating the tangible cost of data breaches. J. Inf. Secur. Appl. 2014, 19, 321–330. [Google Scholar] [CrossRef]
  5. Thapa, C.; Camtepe, S. Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 2021, 129, 104130. [Google Scholar] [CrossRef]
  6. Ponemon Institute. 2020 Cost of Data Breach Study: The US. Sponsored by IBM. Cost of a Data Breach Report 2020|IBM. 2020. Available online: https://www.ibm.com/security/digital-assets/cost-data-breach-report/#/ (accessed on 30 March 2021).
  7. Westland, J.C. The information content of Sarbanes-Oxley in predicting security breaches. Comput. Secur. 2020, 90, 101687. [Google Scholar] [CrossRef] [Green Version]
  8. Da Veiga, A.; Astakhova, L.V.; Botha, A.; Herselman, M. Defining organizational information security culture—Perspectives from academia and industry. Comput. Secur. 2020, 92, 101713. [Google Scholar] [CrossRef]
  9. Diesch, R.; Pfaff, M.; Krcmar, H. A comprehensive model of information security factors for decision-makers. Comput. Secur. 2020, 92, 101747. [Google Scholar] [CrossRef]
  10. Iannacone, M.D.; Bridges, R.A. Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach. Comput. Secur. 2020, 96, 101907. [Google Scholar]
  11. Romanosky, S. Examining the costs and causes of cyber incidents. J. Cybersecur. 2016, 2, 121–135. [Google Scholar] [CrossRef] [Green Version]
  12. Gay, S. Strategic news bundling and privacy breach disclosures. J. Cybersecur. 2017, 3, 91–108. [Google Scholar] [CrossRef] [Green Version]
  13. Sun, H.; Xu, M.; Zhao, P. Modeling Malicious Hacking Data Breach Risks. N. Am. Actuar. J. 2020, 1–19. [Google Scholar] [CrossRef]
  14. Ogonji, M.M.; Okeyo, G.; Wafula, J.M. A survey on privacy and security of Internet of Things. Comput. Sci. Rev. 2020, 38, 100312. [Google Scholar] [CrossRef]
  15. Jouini, M.; Rabai, L.B.A.; Khedri, R. A quantitative assessment of security risks based on a multifaceted classification approach. Int. J. Inf. Secur. 2020, 1–18. [Google Scholar] [CrossRef]
  16. Park, J.Y.; Huh, E.N. A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement. J. Inf. Process. Syst. 2020, 16, 61–82. [Google Scholar]
  17. Li, K.; Tong, Z.; Liu, X.; Zhang, J.; Tong, S. Quantitative assessment and driving force analysis of vegetation drought risk to climate change: Methodology and application in Northeast China. Agric. For. Meteorol. 2020, 282, 107865. [Google Scholar] [CrossRef]
  18. Fusco, F.; Allocca, V.; Coda, S.; Cusano, D.; Tufano, R.; De Vita, P. Quantitative Assessment of Specific Vulnerability to Nitrate Pollution of Shallow Alluvial Aquifers by Process-Based and Empirical Approaches. Water 2020, 12, 269. [Google Scholar] [CrossRef] [Green Version]
  19. HIPAA. 2019 Data Breach Barometer Report Shows the Massive Increase in Exposed Healthcare Records. HIPAA J. 2019. Available online: https://www.hipaajournal.com/2019-data-breach-barometer-report-shows-massive-increase-in-exposed-healthcare-records/ (accessed on 30 March 2021).
  20. Forgerock. Consumer Data Breach Report 2019: Personally Identifiable Information Targeted in Breaches that Impact Billions of Records; Forgerock Breach Report 2019; Forgerock: San Francisco, CA, USA, 2019. [Google Scholar]
  21. Aziz, M.M.A.; Sadat, M.N.; Alhadidi, D.; Wang, S.; Jiang, X.; Brown, C.L.; Mohammed, N. Privacy-preserving techniques of genomic data-a survey. Brief. Bioinform. 2019, 20, 887–895. [Google Scholar] [CrossRef]
  22. Jacobs, J. Analyzing Ponemon Cost of Data Breach. Data Driven Secur. 2014, 11, 5. Available online: http://datadrivensecurity.info/blog/posts/2014/Dec/ponemon/ (accessed on 30 March 2021).
  23. Team, Verizon RISK. 2015 Data Breach Investigations Report. 2015. Available online: http://www.verizonenterprise.com/DBIR/2015/ (accessed on 30 March 2021).
  24. Weiss, N.E.; Miller, R.S. The Target and Other Financial Data Breaches: Frequently Asked Questions Congressional Research Service. 2015. Available online: https://fas.org/sgp/crs/misc/R43496.pdf (accessed on 30 March 2021).
  25. Target Reports Fourth Quarter and Full-Year 2014 Earnings. Available online: http://investors.target.com/phoenix.zhtml?c=65828&p=irol-newsArticle&ID=2019880 (accessed on 30 March 2021).
  26. Target Reports Fourth Quarter and Full-Year 2015 Earnings. Available online: http://investors.target.com/phoenix.zhtml?c=65828&p=irol-newsArticle&ID=2142619 (accessed on 30 March 2021).
  27. Data Breaches May Cost Less Than the Security to Prevent Them. TechRepublic. 2015. Available online: http://www.techrepublic.com/article/data-breaches-may-cost-less-than-the-security-to-prevent-them/ (accessed on 30 March 2021).
  28. PYMNTS. How Much Did the Target, Home Depot Breaches Really Cost. 2015. Available online: http://www.pymnts.com/news/2015/target-home-depot-reveal-full-breach-costs/ (accessed on 30 March 2021).
  29. Ponemon Institute. Why Ponemon Institute’s Cost of Data Breach Methodology Is Sound and Endures. 2015. Available online: https://www.ponemon.org/news-updates/blog/security/why-ponemon-institutes-cost-of-data-breach-methodology-is-sound-and-endures.html (accessed on 30 March 2021).
  30. NetDiligence. 2015 Cyber Claims Study. 2015. Available online: http://netdiligence.com/downloads/NetDiligence_2015_Cyber_Claims_Study_093015.pdf (accessed on 30 March 2021).
  31. Business Dictionary. Definition of Economy of Scale. 2015. Available online: http://www.businessdictionary.com (accessed on 30 March 2021).
  32. Ponemon Institute. 2014 Cost of Data Breach Study: United States. Sponsored by Symantec. 2014. Available online: http://public.dhe.ibm.com/comon/ssi/ecm/se/en/sel03017usen/SEL03017USEN.PDF (accessed on 30 March 2021).
  33. Furnell, S.; Heyburn, H.; Whitehead, A.; Shah, J.N. Understanding the full cost of cybersecurity breaches. Comput. Fraud Secur. 2020, 12, 6–12. [Google Scholar]
  34. Chulani, S.; Barry, B. Modeling Software Defect Introduction and Removal: COQUALMO (Constructive Quality Model); Technical Report No. USC-CSE-99-510; University of Southern California, Center for Software Engineering: Los Angeles, CA, USA, 1999. [Google Scholar]
  35. Malaiya, Y.K. Software Reliability Management. In Encyclopedia of Library and Information Sciences, 3rd ed.; Lee, S., Ed.; Taylor and Francis: Abingdon, UK, 2010; pp. 4901–4912. [Google Scholar]
  36. Aroonvatanaporn, P.; Supannika, K.; Barry, B. COTIPMO: A constructive team improvement process model. In Proceedings of the 2012 International Conference on Software and System Process (ICSSP), Zurich, Switzerland, 2–3 June 2012; pp. 28–37. [Google Scholar]
  37. Zhang, Y.; Xia, J.; Zhang, X.; Chen, Z.; Li, B.; Luo, Q.; He, Y. Modeling and Prediction of the Reliability Analysis of an 18-Pulse Rectifier Power Supply for Aircraft Based Applications. IEEE Access 2020, 8, 47063–47071. [Google Scholar] [CrossRef]
  38. Ponemon Institute. 2015 Cost of Data Breach Study: United States. Sponsored by IBM. 2015. Available online: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03055USEN (accessed on 30 March 2021).
  39. Market Watch. 3 Reasons Why Cyberattacks Don’t Hurt Stock Prices. 2015. Available online: http://www.marketwatch.com/story/3-reasons-why-cyberattacks-dont-hurt-stock-prices-2015-04-03 (accessed on 30 March 2021).
  40. Ponemon Institute. 2015 Cost of Data Breach Study: Global Analysis. Sponsored by IBM. 2015. Available online: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=SA&subtype=WH&htmlfid=SEW03053WWEN (accessed on 30 March 2021).
  41. Security Week. LinkedIn: Breach Cost Up to $1M, Says $2–3 Million in Security Upgrades Coming. 2012. Available online: http://www.securityweek.com/linkedin-breach-cost-1m-says-2-3-million-security-upgrades-coming (accessed on 30 March 2021).
  42. Clif Bar and Company. Organic Energy Bar Market Growth Probability and Future Scenario by 2031. 2021. Available online: https://www.marketwatch.com/press-release/organic-energy-bar-market-growth-probability-and-future-scenario-by-2031-clif-bar-and-company-2021-02-02?siteid=bigcharts&dist=bigcharts&tesla=y (accessed on 30 March 2021).
  43. Couce-Vieira, A.; Insua, D.R.; Kosgodagan, A. Assessing and forecasting cybersecurity impacts. Decis. Anal. 2020, 17, 356–374. [Google Scholar] [CrossRef]
  44. Malaiya, Y.K. Quantitative Cyber-Security; Colorado State University: Fort Collins, CO, USA, 2020; Available online: https://www.cs.colostate.edu/~cs559/f20/slides/L17.pdf (accessed on 30 March 2021).
Figure 1. Average cost per record and average cost of a data breach [6].
Figure 1. Average cost per record and average cost of a data breach [6].
Applsci 11 03678 g001
Figure 2. Average cost per record by type of data compromised in a malicious attack [6].
Figure 2. Average cost per record by type of data compromised in a malicious attack [6].
Applsci 11 03678 g002
Figure 3. Relationship among abuse, attack, cybercrime and data breach.
Figure 3. Relationship among abuse, attack, cybercrime and data breach.
Applsci 11 03678 g003
Figure 4. Overall risk evaluation model (Data breach cost and probability).
Figure 4. Overall risk evaluation model (Data breach cost and probability).
Applsci 11 03678 g004
Figure 5. Data breach probability based on the breach size (Ponemon data 2015) [36].
Figure 5. Data breach probability based on the breach size (Ponemon data 2015) [36].
Applsci 11 03678 g005
Figure 6. Data breach probability by country (Ponemon data 2015) [36].
Figure 6. Data breach probability by country (Ponemon data 2015) [36].
Applsci 11 03678 g006
Table 1. Average cost/record for two record types in hub international calculator by our analysis.
Table 1. Average cost/record for two record types in hub international calculator by our analysis.
Partial CostsAvg. Cost per Record for CC (USD)Avg. Cost per Record for PHI and SSN (USD)
Incident investigation1.151.64
Crisis management3.524.57
Sanctions0.810.81
Lawsuit7.091.56
Total costs12.578.58
Table 2. The breach cost regression models for the three datasets.
Table 2. The breach cost regression models for the three datasets.
DatasetsSize of BreachesData PointsRegression
Breach Cost ModelR2
Ponemon 20135000–100,00054y = 1924.2 x0.76620.52
Ponemon 20144700–103,00061y = 2439.9 x0.74990.50
NetDiligence (Verizon report)2–108 million183y = 10002 x0.49710.54
Table 3. First factor that impacts the data breach cost, required to enter the size of the breach.
Table 3. First factor that impacts the data breach cost, required to enter the size of the breach.
Data SourceSignificant FactorOption
Hub Int’l and
IBM/Ponemon
(1) Total Number of Affected Records?User’s Input
Table 4. The values of data breach costs and the probabilities for the factors associated with data breach types.
Table 4. The values of data breach costs and the probabilities for the factors associated with data breach types.
Factors that Impact the Types of Data Breaches
Data SourceSignificant FactorsOptions with Breach Cost and Probability Values
IBM/ Ponemon (2) Organization’s industry classification?CommunicationsConsumer ProductsEducationFinancial ServicesGovernment ServicesHealthcare and PharmaceuticalsIndustrialRetailServices: professional and general servicesTechnology and softwareTransportationAll others
cost/record (USD)219191184273169289174182243267195217
Probability %1112.513.19.916.512.77.8017.114.912.78.710.1
IBM/ Ponemon(3) Information types do your employees handle?Consumer dataCustomer data including credit card informationCustomer data excluding credit card informationEmployee recordsCitizen recordsStudent informationPatient health dataAll other types of data
cost/record (USD)167243213250169195289210
Probability %11.0012.4012.909.1015.4011.4016.809.00
Table 5. The parameters a and b, the values of data breach costs, and the probabilities for the factors associated with incident investigation cost.
Table 5. The parameters a and b, the values of data breach costs, and the probabilities for the factors associated with incident investigation cost.
Incident Investigation Cost
Data SourceSignificant FactorsOptions with Breach Cost and Probability Values
Hub Int’l(4) Data is in a centralized system/location?YesYesYesNoYesNoNoNo
(5) Actual fraud is expected already?YesYesNoYesNoYesNoNo
(6) Federal class action lawsuit filed?YesNoYesYesNoNoYesNo
For PHI&SSNA1532.81473.21452.4901.371473.2459.15789.08459.15
B0.570.500.560.640.500.660.650.66
For CCA1108.11093.51054.2650.411093.5338.74338.741.4
B0.570.490.560.640.490.660.640.66
IBM/ Ponemon (7) Most likely cause of a data breach?Malicious or criminal attackNegligence or mistakes (Human error)System glitchDon’t know
cost/record (USD)291163169245
Probability %16.6010.309.5012.60
(8) Is sensitive data encrypted on all laptops or removable storage?YesNoNot sure
cost/record (USD)130267254
Probability %8.8014.2013.80
(9) Best describes your organization’s privacy and data protection program?A formal privacy and data protection program that is enterprise-wideA formal privacy and data protection program that is not enterprise-wideAn informal privacy and data protection program that is enterprise-wideAn informal privacy and data protection program that is not enterprise-wideNo privacy or data protection program in place
cost/record (USD)156202228241258
Probability %10.1010.4011.3013.5016.00
IDT911(10) Duration of business keep/retain sensitive information pertaining to employees, customers and patients?Less than 3 monthsMore than 3 months but less than 3 yearsMore than 3 years but less than 5 yearsMore than 5 yearsDon’t know
cost/breach2501000200030003000
Table 6. The values of data breach costs and the probabilities for the factors associated with crisis management cost.
Table 6. The values of data breach costs and the probabilities for the factors associated with crisis management cost.
Crisis Management Cost
Data SourceSignificant FactorsOptions with Breach Cost and Probability Values
Hub Int’l(11) Credit monitoring years?0123451020
For PHI&SSNA31.2560.7185.19108.71131.87154.86268.94496.06
B0.830.840.840.850.850.850.860.86
For CCA21.1141.5058.7375.2391.52107.65187.58346.62
B0.840.840.850.850.850.850.860.86
IBM/ Ponemon(12) What is the global headcount of your organization?Fewer than 500501 to 10001001 to 50005001 to 10,00010,001 to 25,00025,001 to 75,000More than 75,000
cost/record (USD)167180230243269224206
Probability %11.0011.2013.4013.5012.8012.5011.40
IBM/ Ponemon(13) Is your organization’s business continuity management team involved in the data breach incident response process?YesNoNot sure
cost/record (USD)184243224
Probability %10.5013.8012.50
Table 7. The parameters a and b for the factors associated with the cost related to regulatory and industry sanctions.
Table 7. The parameters a and b for the factors associated with the cost related to regulatory and industry sanctions.
Regulatory and Industry Sanctions Cost
Data SourceSignificant FactorsOptions with Breach Cost and Probability Values
Hub Int’l(14) Is PCI compliance an issue?YesNo
For PHI&SSNa19,145865,754
b0.430.02
For CCa11,308610,611
b0.470.03
Table 8. The parameters a and b for the factors associated with class-action lawsuit cost.
Table 8. The parameters a and b for the factors associated with class-action lawsuit cost.
Class Action Lawsuit Cost
Data SourceSignificant FactorsOptions with Breach Cost and Probability Values
Hub Int’l(15) Actual Fraud is expected already?YesYesNoNo
(16) Federal Class Action Lawsuit filed?YesNoYesNo
For PHI&SSNa0.3600.090
b1.1601.160
For CCa5.1265.686
b1.0411.011
Table 9. Cost factor—data breach causes Fbreach_cause.
Table 9. Cost factor—data breach causes Fbreach_cause.
Data Breach CauseMultiplier
Malicious or criminal attack1.19
Negligence or mistakes (Human error)0.67
System glitch0.69
Don’t know1 (default)
Table 10. Cost factor—sensitive data encryption FEncryption.
Table 10. Cost factor—sensitive data encryption FEncryption.
Encryption Sensitive DataMultiplier
Yes0.51
No1.05
Not sure1 (default)
Table 11. Cost factor—FBCM.
Table 11. Cost factor—FBCM.
BCM Involved in Incident Response PlanMultiplier
Yes0.82
No1.08
Not sure1 (default)
Table 12. Cost factor—organization’s industry classification FI.
Table 12. Cost factor—organization’s industry classification FI.
Industry ClassificationMultiplier
Communications1.01
Consumer Products0.88
Education0.85
Financial Services1.26
Government Services0.78
Healthcare and Pharmaceuticals1.33
Industrial0.80
Retail0.84
Services: professional and general services1.12
Technology and software1.23
Transportation0.90
All others1 (default)
Table 13. Cost factor—sensitive information keeping FD.
Table 13. Cost factor—sensitive information keeping FD.
DurationMultiplier
3 months 0.125
1 year0.5
4 years1 (default)
6 years1.5
Table 14. Probability factor for FBCM.
Table 14. Probability factor for FBCM.
BCM Involved in Incident Response PlanMultiplier
Yes 0.84
No 1.1
Not sure 1 (default)
Table 15. Probability factor—data breach causes FBREACH_CAUSE.
Table 15. Probability factor—data breach causes FBREACH_CAUSE.
Data Breach CauseMultiplier
Malicious or criminal attack1.32
Negligence or mistakes (Human error)0.82
System glitch0.75
Don’t know1 (default)
Table 16. Probability factor—sensitive data encryption FE.
Table 16. Probability factor—sensitive data encryption FE.
Encryption Sensitive DataMultiplier
Yes 0.64
No 1.09
Not sure 1 (default)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Algarni, A.M.; Thayananthan, V.; Malaiya, Y.K. Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems. Appl. Sci. 2021, 11, 3678. https://doi.org/10.3390/app11083678

AMA Style

Algarni AM, Thayananthan V, Malaiya YK. Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems. Applied Sciences. 2021; 11(8):3678. https://doi.org/10.3390/app11083678

Chicago/Turabian Style

Algarni, Abdullah M., Vijey Thayananthan, and Yashwant K. Malaiya. 2021. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems" Applied Sciences 11, no. 8: 3678. https://doi.org/10.3390/app11083678

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop