Loading

Cyber Insurance
Alex R Mathew

Ph.D. in Computer Science and Engineering, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 4447-4451 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8076088619/2019©BEIESP | DOI: 10.35940/ijeat.F8976.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Information Technology is an essential discipline in our daily activities. We use our mobile phones often to communicate with our loved ones, research over the internet, and much more. Organizations and institutions today solely rely on computers configured over networks in their daily operations. Organizations prefer having their information backed up on virtual servers referred to as cloud computing. Cloud computing is among the safest measures to information security. We often share information either directly using storage media or over the internet. Information shared or stored over the internet is prone to attacks referred to as cyberattacks. Cyberattacks can result in total impairment of an organization’s data, blockage of part or the whole information in the form of a trojan. At this point, the attacker demands payment before they grant you access to your information. Cyberattacks have thus resulted in organizations encrypting their information. However, despite the use of advanced encryption technique, cyber attackers have gone beyond this level of technology to hack into the data by gaining access to the decryption key. Researchers have thus come up with cyber insurance, which offers security to organizations’ and businesses’ information. Cyber insurance uses high-level algorithms that are difficult for the attackers to understand. It minimizes cases of information compromisation.
Keywords: Phishing, Trojan, Espionage, Nash equilibrium, Encryption, Cloud Computing.