• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

How AIG’s Cyber Security Gamble Could Pay Off

April 9, 2017 by Anthony Clayton Fecondo 1 Comment

Article

AIG recently began selling cyber security insurance plans on an individual level aimed at the upper class. The article analyzes the various factors that may affect the success of this endeavor. For example, the risk pool may have an adverse selection problem, the actual risk might be too difficult to calculate, and there might not be enough demand. However, the author also postulates that AIG can be profitable from this due to its ability to collect massive amounts of data and absorb high loss rates while it figures everything out.

I think its an interesting idea, but I don’t know how realistic individual cyber security insurance is. I understand that having bank account numbers lost is something to protect against, but at the same time, credit cards that get stolen generally totally absolve their customers of any fraudulent charges. I think that moving in this customer service direction is more realistically the way of the future which would invalidate the need for that kind of insurance. Another thought I had is that it would be difficult for one person to incur significant losses to validate the need for insurance. I could be wrong and this form of insurance could be super lucrative, who knows.

Filed Under: Week 14 Tagged With:

Reader Interactions

Comments

  1. Scott Radaszkiewicz says

    April 10, 2017 at 10:20 am

    Anthony, very interesting article. I just had a conversation with a colleague a few weeks ago. We were discussing ransom ware. A client of his was hit with Cryptolocker and lost some very important files. They were faced with a decision on paying the ransom or losing the files. They decided that it was easier to re-create the files they lost, they had the ability to do that. It was a money decision. X amount to recreate, Y amount to pay the ransom.

    So, we had talked about business continuity and insurance. They had insurance to cover them in the event of things like fire, building damage, etc. We started to talk about coverage for cyber attacks too. Didn’t think it would take long before companies would start offering this type of thing!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in