Some theoretical aspects for determining the required number of mobile groups involved in objects security assurance from the impact of various negative factors have been considered. A mathematical model, that allow substantiate the required number of groups for timely response to negative factors has been developed. The total number of response teams has been determined and corrected with account for probability of false alarm related to several technical detection means. The influence of placement for technical detection means, and response teams, as well as of negative factors’ characteristics on the catch line tailoring has been shown. The negative factor’s catch line sizes in dependence to the detection means’ concrete location have been calculated. A certainty increase for operation of technical detection means is carried out by determining the regularity of triggering moments, taking into account the appearance of false alarms. An inspection for received signals’ certainty is carried out by guard personnel from response teams. The developed model will allow increase the security system’s response time to the negative factor. The specified models will allow develop the software for modeling of real situations.
A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among other company’s risks has been demonstrated, i. e. the context of cyber risk among the risks of any commercial organization has been shown. A typical cyber insurance process has been described, and a scheme of cyber insurance processes has been developed. A brief description of problem areas and controversial issues in cyber insurance, with which cyber-risk insurance practices may face, has been presented, as well as a table showing at which stage of cyber-insurance the specific problems may arise. Has been provided the basic economic utility function, which formalizes decision making for agents with a different attitude to risk. Standards in cyber security, and various software products that can be used as a tool for assessing the security level of an enterprise’s IT infrastructure have been presented, and it has been demonstrated how these products can help in cyber risk ssessment. Different methods used at each stage of cyber insurance have been shown.