SlideShare une entreprise Scribd logo
1  sur  49
The Economics Of Networks  And Cybersecurity Rod Beckström Director National Cybersecurity Center December 12, 2008 ©U.S. Department of Homeland Security. Author: Rod Beckström
Economics of Networks Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses)
Economics of Networks What is the value of a network? How much should be spent to defend it? Fundamental Questions
Economics of Networks A user can have an implicit or explicit contractual relationship with a network and perform transactions through it.  The presence of a network can impact the price, value and nature of transactions.  Some transactions may only be available only on that network. Definition of Relationship to Network
Economics of Networks A user can be any entity that contracts for transactions, whether an individual, company, non-profit organization, government or any other party. Definition of a User
Economics of Networks Previous models focused on the number of nodes or users (Metcalfe’s Law, Reed’s Law), or on the architecture or structure of the network.  This focus was misplaced. Valuing Networks
Economics of Networks The value of a network equals the net value added to each user’s transactions conducted through that network, summed for all users. New Network Valuation Model
Economics of Networks The value of a network equals the value added to all transactions conducted on that network, valued from the standpoint of each user. New Network Valuation Model Alternative but Equivalent Description
New Network Model V  =  ΣB  - ΣC  Where: V  = value of network to one user B  = the benefit value of all transactions C  = the cost of all transactions Value of a Network to One User
Economics of Networks First, we need to determine the value a network like the Internet adds to a single user such as you. Then, if we do the same for all users and sum it up, we have the total network value. Let’s first calculate the value of one transaction, that of purchasing a book online versus at the bookstore.
Book Purchase Example V  =  B  -  C V  = $26 - $16 V  = $10  You decide to buy a book online instead of at a bookstore,  to save money. How much value does the network add?  If it costs $26 to buy the book in a store or $16 to buy it over the  Internet, including shipping, the net value is $10.
One User Example If you then tallied up all of the books and other products a user purchased over the internet, and the Benefit value of free searches, research, reading, entertainment and phone  calls, less all associated costs of network usage and  transactions, you then have a composite net value V to that  Individual over any time period, for example, one year. The same approach can be used to value any network for that user.
Economics of Networks The benefit value is bounded with a lower and an upper limit.  It should be higher than the Cost and it should be equal or less than the Cost of obtaining the product through another means, with identical quality of service.  In a paired transaction like buying a book, where you deliver money and receive a book, the Benefit is assumed to be higher than the Cost.  You would not pay more for a book than you value it.  On the upper limit, the Benefit should not be greater than the all-in cost of purchasing an identical product or service from another provider.  So if instead of buying a book online, you could pick it up from the bookstore below your office for $26 (including your time), then that is the maximum Benefit, even if you would pay $100 for it if you had to.  Benefits (B) are Bounded
Economics of Networks Benefits (B) are Bounded C  <  B  < LAC  Where: C  = Cost of a transaction B  = the benefit value of a transactions LAC  = the Lowest Alternative Cost of a      transaction through another network
Economics of Networks Because the Benefits are bounded, and the value to transactions is computed for each user from their unique perspective, it is possible to sum the value to all users. In the book example, the user benefits $10. The online bookseller can still make a $1 profit, which is their net value from the transaction as well. The shipper may make 50 cents on the transactions.  These net benefits gained by other parties can be summed up for the network, and there is no double counting. Benefits (B) are Bounded
Economics of Networks Costs include the cost of joining or maintaining access to a network, such as paying for Internet access charges, and all costs of doing transactions over that network, including labor time, electricity, the costs of products, and any other costs.  Most costs (except time) can be fairly straight forward to track and account for. The Internet is interesting as a network, because once access is paid for, there are many services which are offered for free, such as Skype calls, Wikipedia information, search services, etc.  These provides significant Benefits (B).  Costs (C)
ΣV  =  ΣB  - ΣC  Where: ΣV  = value to all users of a network B  = the benefit value of all transactions C  = the cost of all transactions Network Value is Summation of Value to All Users New Network Model
Where: ΣV i,j  = value of a network  j  to all users V i,j  = net present value of all transactions to user i   with respect  to network  j,  over any time period j   = identifies one network i   = one user of the network B i,k  = the benefit value of transaction  k  to individual  i C i,l  = the cost of transaction  l  to individual  i r k   and  r l   = the discount rate of interest to the time of transaction  k  or l t k  or  t l   = the elapsed time in years to transaction  k  or  l New Network Model Beckström’s Proposed Model for Valuing Networks
The “Network Effect” This effect is much discussed but poorly defined. Generally refers to increase in value of network as size increases. Metcalfe’s Law is sometimes referred to. Using the New Network Valuation Model, the value of the network increases as more users join, bringing more transactions to the network. The more potential transactions a network has to offer, the more users will be attracted to it.
The “Network Effect” The more users are attracted, the more valuable the network becomes, and a virtuous cycle develops. Other networks stand to lose as one gains. The value is locked in, if there are no comparable networks, or there are significant barriers and costs to switching.
The “Network Effect” As the number of users doing transactions grows, the value Of a network tends to grow (unless the increase in number of users has some offsetting negative effect on the network, such as Less trust).  For networks that increase in value with size: Some examples of networks that decrease in value with increase in size are support groups and exclusive clubs.
The “Network Effect” More broadly, as more users move to the Internet, it is replacing almost all other networks, because it adds Continues to add more value to most users: V Internet   >  V Proprietary Where: V Proprietary   = Value of a proprietary network V Internet   = Value of Internet network
The “Network Effect” You need to buy a flight, and can call around to airlines (phone) or use a travel search engine on the Internet. You might  rank the value of services as follows: Where: V Internet   = Transaction Value of Internet Network V Phone   = Transaction Value of Travel Agent Service V Internet  > V Phone
“ Inverse Network Effect” Some networks decrease in value when they exceed a certain size. Whether a corporate board, a support group, or an exclusive club, Some networks decrease in value as size increases, beyond  some point. Sometimes less is more.  Beyond their optimal size, These networks exhibit the following behavior: Why?  In support groups for example, there is only so much time for each person to speak. More people, less speaking for each,  plus the affinity may decrease.
Economics of Security V  =  B  - C  Basic Model Sigmas ( Σ’s)  ommited but assumed henceforward.
Economics of Security Where: SI = Security Investments L  = Losses C’  = C – SI – L (all costs except SI & L) Basic Model V  =  B  - C’ - SI  - L  Security  Model V  =  B  - C
Economics of Security Minimize Security Costs  =  SI  +  L  The Fundamental Security  Risk Management Function
Loss $ Security Investment $ Economics of Security 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve)
Loss $ Security Investment $ Economics of Security 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP
Loss $ Economics of Security Security Investment $ 0 Optimal Security Investment occurs where $1 of Investment reduces $1 in losses, tangential to 45 degree line.
Economics of deterrence Minimize the Hacker’s Gain Minimize V  =  B  -  C’  - SI  - L  For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments  (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing  Penalties and imprisonment, for example.
Hacker Economics NPV  =  B  - C’ - SI  - L  Your Loss
Hacker Economics V  =  B  - C’ - SI  -  L  Your Loss Is the Hacker’s Gain V  =  B   -  C’ - SI  - L
Hacker Economics V  =  B  - C’ - SI  -  L  Your Loss Is the Hacker’s Gain V  =  B   -  C’ - SI  - L   Criminal hacking for financial gain is worse than a zero  sum game.  It creates no value and adds great costs to the system.
Economics of deterrence Minimize V  =  B  -  C’  - SI  - L  Minimize the Hacker’s Gain
Economics of deterrence Minimize the Hacker’s Gain Minimize V  =  B  -  C’  - SI  - L  For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments  (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing  Penalties and imprisonment, for example.
Supply Chain Policy Objective:  reduce malicious code in products Supply Chain Economics NPV  =  B  - C’ -  SI  - L  Hackers Like High Benefit/Low Cost of Embedded Malcode
Supply Chain Solution NPV  =  ΣB  - ΣC’ - ΣSI  - ΣL  ,[object Object],[object Object],NPV  =  ΣB  - ΣC’ - ΣSI  - ΣL  2) Punish Bad Guys Levy large fines on companies with infected products
Loss $ Economics of Protocols Better network protocols can drive  Loss function down for most or all users. Security Investment $ 0
Enhance Internet Architecture IPv6, DNS-SEC, BGP-SEC, SMTP   Protect Other Networks/Protocols   SMS/IP, POTS … Protocol Investments
Economics of Outages If Network Shuts Down: 1) Normal operating loss goes to zero 2) Loss becomes lost V (Value of Network) V  =  B  - C’ - SI  - L  Security  Model L  =  Lost NPV
Impact of IP Outages Where: L IP,i  =  lost value of Internet Protocol (IP) services failing to activity i i  =  a category economic activity L IP,Ecommerce  = Economic Loss of IP service failure to Ecommerce i  = 1 n
Impact of IP Outages IP based economic activities spread… as surely as an apple falls from a tree with the power of a tsunami the value of the Internet increases many or most activities become vulnerable all activities which are IP dependent, trend towards a correlation of losses of 1.0 this is one of the greatest points of economic  and security risk in the world
Economics of Networks Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses)
The Model Can… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of New Model Highly granular (every transaction included) Focuses on value to each party from their standpoint Accurate Simple Network architecture independent  Scales from one user to one or all networks Subsets of users can be analyzed No double counting of benefits Consistent with existing cost accounting methods (e.g. amortizing costs over time) Consistent with profit and loss accounting Can be applied as foundation model for other network,  security and policy problems (deterrence, outages, etc.)
Questions About Model Is this a new universal model for network valuation?  Why or why not? Does it equally apply to off-line social networks (e.g. trade associations) as on-line networks? Can it be used to value other relationships between individuals, or between creatures in nature? Should it be called an Economic Model of Relationships instead of an Economic Model of Networks?
Possible Next Steps Empirical work to estimate Benefits and Costs in various networks or for various companies, countries. New derivatives of model can be developed to examine problems such as Net Neutrality and internet service pricing policies, and issues of privacy.
Economics Of  Networks  And Cybersecurity  Rod Beckstrom Director [email_address]

Contenu connexe

Tendances

Netflix Recommendations - Beyond the 5 Stars
Netflix Recommendations - Beyond the 5 StarsNetflix Recommendations - Beyond the 5 Stars
Netflix Recommendations - Beyond the 5 StarsXavier Amatriain
 
한국투자증권의 디지털 플랫폼 구현 사례.pdf
한국투자증권의 디지털 플랫폼 구현 사례.pdf한국투자증권의 디지털 플랫폼 구현 사례.pdf
한국투자증권의 디지털 플랫폼 구현 사례.pdfAWS Korea 금융산업팀
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityEvernym
 
A Multi-Armed Bandit Framework For Recommendations at Netflix
A Multi-Armed Bandit Framework For Recommendations at NetflixA Multi-Armed Bandit Framework For Recommendations at Netflix
A Multi-Armed Bandit Framework For Recommendations at NetflixJaya Kawale
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
 
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...AWS Korea 금융산업팀
 
Pace of Innovation at AWS - London Summit Enteprise Track RePlay
Pace of Innovation at AWS - London Summit Enteprise Track RePlayPace of Innovation at AWS - London Summit Enteprise Track RePlay
Pace of Innovation at AWS - London Summit Enteprise Track RePlayAmazon Web Services
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Recent Trends in Personalization at Netflix
Recent Trends in Personalization at NetflixRecent Trends in Personalization at Netflix
Recent Trends in Personalization at NetflixJustin Basilico
 
[메조미디어] 2023 보험 업종 분석 리포트
[메조미디어] 2023 보험 업종 분석 리포트[메조미디어] 2023 보험 업종 분석 리포트
[메조미디어] 2023 보험 업종 분석 리포트MezzoMedia
 
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...Amazon Web Services Korea
 
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...Amazon Web Services Korea
 
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...Taste
 
9 strategy tools digital transformationplaybook - david rogers
9 strategy tools   digital transformationplaybook - david rogers9 strategy tools   digital transformationplaybook - david rogers
9 strategy tools digital transformationplaybook - david rogersadkhan23
 
How to make Headless Commerce Strategy.
How to make Headless Commerce Strategy.How to make Headless Commerce Strategy.
How to make Headless Commerce Strategy.Aureate Labs
 
[메조미디어] Media&Market Report_2023.11
[메조미디어] Media&Market Report_2023.11[메조미디어] Media&Market Report_2023.11
[메조미디어] Media&Market Report_2023.11MezzoMedia
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Amazon Web Services
 

Tendances (20)

Netflix Recommendations - Beyond the 5 Stars
Netflix Recommendations - Beyond the 5 StarsNetflix Recommendations - Beyond the 5 Stars
Netflix Recommendations - Beyond the 5 Stars
 
한국투자증권의 디지털 플랫폼 구현 사례.pdf
한국투자증권의 디지털 플랫폼 구현 사례.pdf한국투자증권의 디지털 플랫폼 구현 사례.pdf
한국투자증권의 디지털 플랫폼 구현 사례.pdf
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
A Multi-Armed Bandit Framework For Recommendations at Netflix
A Multi-Armed Bandit Framework For Recommendations at NetflixA Multi-Armed Bandit Framework For Recommendations at Netflix
A Multi-Armed Bandit Framework For Recommendations at Netflix
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
 
Pace of Innovation at AWS - London Summit Enteprise Track RePlay
Pace of Innovation at AWS - London Summit Enteprise Track RePlayPace of Innovation at AWS - London Summit Enteprise Track RePlay
Pace of Innovation at AWS - London Summit Enteprise Track RePlay
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Recent Trends in Personalization at Netflix
Recent Trends in Personalization at NetflixRecent Trends in Personalization at Netflix
Recent Trends in Personalization at Netflix
 
[메조미디어] 2023 보험 업종 분석 리포트
[메조미디어] 2023 보험 업종 분석 리포트[메조미디어] 2023 보험 업종 분석 리포트
[메조미디어] 2023 보험 업종 분석 리포트
 
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...
AWS Summit Seoul 2023 | 롯데면세점이 고객에게 차별화된 경험을 제공하는 방법: AWS Native 서비스를 활용한 초개인...
 
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...
AWS Amplify를 통한 손쉬운 모바일 애플리케이션 개발하기 - 김필중 솔루션즈 아키텍트, AWS :: AWS Summit Seoul ...
 
[4차]넷플릭스 알고리즘 분석(151106)
[4차]넷플릭스 알고리즘 분석(151106)[4차]넷플릭스 알고리즘 분석(151106)
[4차]넷플릭스 알고리즘 분석(151106)
 
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...
Data Restart 2022: Pavel Jašek - Jak se řídí výkonnostní marketing s nedokona...
 
9 strategy tools digital transformationplaybook - david rogers
9 strategy tools   digital transformationplaybook - david rogers9 strategy tools   digital transformationplaybook - david rogers
9 strategy tools digital transformationplaybook - david rogers
 
How to make Headless Commerce Strategy.
How to make Headless Commerce Strategy.How to make Headless Commerce Strategy.
How to make Headless Commerce Strategy.
 
[메조미디어] Media&Market Report_2023.11
[메조미디어] Media&Market Report_2023.11[메조미디어] Media&Market Report_2023.11
[메조미디어] Media&Market Report_2023.11
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...
 

En vedette

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHSRodBeckstrom
 
Short term hotel management contract - white paper
Short term hotel management contract - white paperShort term hotel management contract - white paper
Short term hotel management contract - white papergisenberg1
 
Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slidesharethinkbitcoin
 
Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationGavin Davey
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009RodBeckstrom
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsDr. Juan Trujillo
 
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction Design
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction DesignOvercoming Enterprise 2.0 Hurdles
 with Social Interaction Design
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction DesignThomas Vander Wal
 
Getting The C-Suite On Your Side
Getting The C-Suite On Your SideGetting The C-Suite On Your Side
Getting The C-Suite On Your SideThoughtFarmer
 
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia..."Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...Blend Interactive
 
"Work like the Network" for the Social Business Summit 2010
"Work like the Network" for the Social Business Summit 2010"Work like the Network" for the Social Business Summit 2010
"Work like the Network" for the Social Business Summit 2010Lane Becker
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsSITA
 
The four purposes of an intranet [+ audio]
The four purposes of an intranet  [+ audio]The four purposes of an intranet  [+ audio]
The four purposes of an intranet [+ audio]James Robertson
 
the influence of computerized accounting on financial reporting in Microfinan...
the influence of computerized accounting on financial reporting in Microfinan...the influence of computerized accounting on financial reporting in Microfinan...
the influence of computerized accounting on financial reporting in Microfinan...Eliot bama
 

En vedette (20)

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
 
Short term hotel management contract - white paper
Short term hotel management contract - white paperShort term hotel management contract - white paper
Short term hotel management contract - white paper
 
Cybersecurity in the sky
Cybersecurity in the skyCybersecurity in the sky
Cybersecurity in the sky
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slideshare
 
Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentation
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond Politics
 
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction Design
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction DesignOvercoming Enterprise 2.0 Hurdles
 with Social Interaction Design
Overcoming Enterprise 2.0 Hurdles
 with Social Interaction Design
 
Getting The C-Suite On Your Side
Getting The C-Suite On Your SideGetting The C-Suite On Your Side
Getting The C-Suite On Your Side
 
Social Comfort
Social ComfortSocial Comfort
Social Comfort
 
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia..."Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
"Overcoming the Fear: What C-Level Execs are Afraid of When it Comes to Socia...
 
"Work like the Network" for the Social Business Summit 2010
"Work like the Network" for the Social Business Summit 2010"Work like the Network" for the Social Business Summit 2010
"Work like the Network" for the Social Business Summit 2010
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
The four purposes of an intranet [+ audio]
The four purposes of an intranet  [+ audio]The four purposes of an intranet  [+ audio]
The four purposes of an intranet [+ audio]
 
the influence of computerized accounting on financial reporting in Microfinan...
the influence of computerized accounting on financial reporting in Microfinan...the influence of computerized accounting on financial reporting in Microfinan...
the influence of computerized accounting on financial reporting in Microfinan...
 

Similaire à The Economics Of Networks And Cybersecurity Rod Beckström December 2008

081212d Economics Of Networks
081212d Economics Of Networks081212d Economics Of Networks
081212d Economics Of Networkslarryme38
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study PaperOlga Bautista
 
Bba ii cam u iv-information systems application & computer security
Bba ii cam  u iv-information systems application & computer securityBba ii cam  u iv-information systems application & computer security
Bba ii cam u iv-information systems application & computer securityRai University
 
Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Netcetera
 
Unit of Value: A Framework for Scaling
Unit of Value: A Framework for ScalingUnit of Value: A Framework for Scaling
Unit of Value: A Framework for ScalingGreylock Partners
 
Economic Moats - For Early Stage Startups and Early Stage Investors
Economic Moats - For Early Stage Startups and Early Stage InvestorsEconomic Moats - For Early Stage Startups and Early Stage Investors
Economic Moats - For Early Stage Startups and Early Stage InvestorsBrian Laung Aoaeh, CFA
 
Encouraging Children To Write
Encouraging Children To WriteEncouraging Children To Write
Encouraging Children To WriteTonya Roberts
 
Managed Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave SobelManaged Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave SobelMAXfocus
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"Peter Coffee
 
The Network Effects Bible
The Network Effects BibleThe Network Effects Bible
The Network Effects BibleNFX
 
01ch
01ch01ch
01chpcomo
 
Nick Economides: Net Neutrality on the Internet
Nick Economides: Net Neutrality on the InternetNick Economides: Net Neutrality on the Internet
Nick Economides: Net Neutrality on the InternetARNIC
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...Panagiotis Papadopoulos
 
Economics of platforms - Aditya.pdf
Economics of platforms - Aditya.pdfEconomics of platforms - Aditya.pdf
Economics of platforms - Aditya.pdfvineeth40
 
Innovirtua eCommerce vs vBusiness
Innovirtua eCommerce vs vBusinessInnovirtua eCommerce vs vBusiness
Innovirtua eCommerce vs vBusinessInnovirtua
 

Similaire à The Economics Of Networks And Cybersecurity Rod Beckström December 2008 (20)

081212d Economics Of Networks
081212d Economics Of Networks081212d Economics Of Networks
081212d Economics Of Networks
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
 
Bba ii cam u iv-information systems application & computer security
Bba ii cam  u iv-information systems application & computer securityBba ii cam  u iv-information systems application & computer security
Bba ii cam u iv-information systems application & computer security
 
A genealogy of network effects
A genealogy of network effectsA genealogy of network effects
A genealogy of network effects
 
Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)Economics of Cloud Computing (Jazoon'11)
Economics of Cloud Computing (Jazoon'11)
 
Unit of Value: A Framework for Scaling
Unit of Value: A Framework for ScalingUnit of Value: A Framework for Scaling
Unit of Value: A Framework for Scaling
 
The Network Effects
The Network EffectsThe Network Effects
The Network Effects
 
Economic Moats - For Early Stage Startups and Early Stage Investors
Economic Moats - For Early Stage Startups and Early Stage InvestorsEconomic Moats - For Early Stage Startups and Early Stage Investors
Economic Moats - For Early Stage Startups and Early Stage Investors
 
Encouraging Children To Write
Encouraging Children To WriteEncouraging Children To Write
Encouraging Children To Write
 
Managed Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave SobelManaged Services in 2014: Pricing and Positioning - Dave Sobel
Managed Services in 2014: Pricing and Positioning - Dave Sobel
 
Building the Global "Cloud 2"
Building the Global "Cloud 2"Building the Global "Cloud 2"
Building the Global "Cloud 2"
 
The Network Effects Bible
The Network Effects BibleThe Network Effects Bible
The Network Effects Bible
 
Financial transparency
Financial transparencyFinancial transparency
Financial transparency
 
01ch
01ch01ch
01ch
 
Nick Economides: Net Neutrality on the Internet
Nick Economides: Net Neutrality on the InternetNick Economides: Net Neutrality on the Internet
Nick Economides: Net Neutrality on the Internet
 
E commerce MODEL
E commerce MODELE commerce MODEL
E commerce MODEL
 
Catb booklet
Catb bookletCatb booklet
Catb booklet
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...
 
Economics of platforms - Aditya.pdf
Economics of platforms - Aditya.pdfEconomics of platforms - Aditya.pdf
Economics of platforms - Aditya.pdf
 
Innovirtua eCommerce vs vBusiness
Innovirtua eCommerce vs vBusinessInnovirtua eCommerce vs vBusiness
Innovirtua eCommerce vs vBusiness
 

Dernier

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 

Dernier (20)

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 

The Economics Of Networks And Cybersecurity Rod Beckström December 2008

  • 1. The Economics Of Networks And Cybersecurity Rod Beckström Director National Cybersecurity Center December 12, 2008 ©U.S. Department of Homeland Security. Author: Rod Beckström
  • 2. Economics of Networks Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses)
  • 3. Economics of Networks What is the value of a network? How much should be spent to defend it? Fundamental Questions
  • 4. Economics of Networks A user can have an implicit or explicit contractual relationship with a network and perform transactions through it. The presence of a network can impact the price, value and nature of transactions. Some transactions may only be available only on that network. Definition of Relationship to Network
  • 5. Economics of Networks A user can be any entity that contracts for transactions, whether an individual, company, non-profit organization, government or any other party. Definition of a User
  • 6. Economics of Networks Previous models focused on the number of nodes or users (Metcalfe’s Law, Reed’s Law), or on the architecture or structure of the network. This focus was misplaced. Valuing Networks
  • 7. Economics of Networks The value of a network equals the net value added to each user’s transactions conducted through that network, summed for all users. New Network Valuation Model
  • 8. Economics of Networks The value of a network equals the value added to all transactions conducted on that network, valued from the standpoint of each user. New Network Valuation Model Alternative but Equivalent Description
  • 9. New Network Model V = ΣB - ΣC Where: V = value of network to one user B = the benefit value of all transactions C = the cost of all transactions Value of a Network to One User
  • 10. Economics of Networks First, we need to determine the value a network like the Internet adds to a single user such as you. Then, if we do the same for all users and sum it up, we have the total network value. Let’s first calculate the value of one transaction, that of purchasing a book online versus at the bookstore.
  • 11. Book Purchase Example V = B - C V = $26 - $16 V = $10 You decide to buy a book online instead of at a bookstore, to save money. How much value does the network add? If it costs $26 to buy the book in a store or $16 to buy it over the Internet, including shipping, the net value is $10.
  • 12. One User Example If you then tallied up all of the books and other products a user purchased over the internet, and the Benefit value of free searches, research, reading, entertainment and phone calls, less all associated costs of network usage and transactions, you then have a composite net value V to that Individual over any time period, for example, one year. The same approach can be used to value any network for that user.
  • 13. Economics of Networks The benefit value is bounded with a lower and an upper limit. It should be higher than the Cost and it should be equal or less than the Cost of obtaining the product through another means, with identical quality of service. In a paired transaction like buying a book, where you deliver money and receive a book, the Benefit is assumed to be higher than the Cost. You would not pay more for a book than you value it. On the upper limit, the Benefit should not be greater than the all-in cost of purchasing an identical product or service from another provider. So if instead of buying a book online, you could pick it up from the bookstore below your office for $26 (including your time), then that is the maximum Benefit, even if you would pay $100 for it if you had to. Benefits (B) are Bounded
  • 14. Economics of Networks Benefits (B) are Bounded C < B < LAC Where: C = Cost of a transaction B = the benefit value of a transactions LAC = the Lowest Alternative Cost of a transaction through another network
  • 15. Economics of Networks Because the Benefits are bounded, and the value to transactions is computed for each user from their unique perspective, it is possible to sum the value to all users. In the book example, the user benefits $10. The online bookseller can still make a $1 profit, which is their net value from the transaction as well. The shipper may make 50 cents on the transactions. These net benefits gained by other parties can be summed up for the network, and there is no double counting. Benefits (B) are Bounded
  • 16. Economics of Networks Costs include the cost of joining or maintaining access to a network, such as paying for Internet access charges, and all costs of doing transactions over that network, including labor time, electricity, the costs of products, and any other costs. Most costs (except time) can be fairly straight forward to track and account for. The Internet is interesting as a network, because once access is paid for, there are many services which are offered for free, such as Skype calls, Wikipedia information, search services, etc. These provides significant Benefits (B). Costs (C)
  • 17. ΣV = ΣB - ΣC Where: ΣV = value to all users of a network B = the benefit value of all transactions C = the cost of all transactions Network Value is Summation of Value to All Users New Network Model
  • 18. Where: ΣV i,j = value of a network j to all users V i,j = net present value of all transactions to user i with respect to network j, over any time period j = identifies one network i = one user of the network B i,k = the benefit value of transaction k to individual i C i,l = the cost of transaction l to individual i r k and r l = the discount rate of interest to the time of transaction k or l t k or t l = the elapsed time in years to transaction k or l New Network Model Beckström’s Proposed Model for Valuing Networks
  • 19. The “Network Effect” This effect is much discussed but poorly defined. Generally refers to increase in value of network as size increases. Metcalfe’s Law is sometimes referred to. Using the New Network Valuation Model, the value of the network increases as more users join, bringing more transactions to the network. The more potential transactions a network has to offer, the more users will be attracted to it.
  • 20. The “Network Effect” The more users are attracted, the more valuable the network becomes, and a virtuous cycle develops. Other networks stand to lose as one gains. The value is locked in, if there are no comparable networks, or there are significant barriers and costs to switching.
  • 21. The “Network Effect” As the number of users doing transactions grows, the value Of a network tends to grow (unless the increase in number of users has some offsetting negative effect on the network, such as Less trust). For networks that increase in value with size: Some examples of networks that decrease in value with increase in size are support groups and exclusive clubs.
  • 22. The “Network Effect” More broadly, as more users move to the Internet, it is replacing almost all other networks, because it adds Continues to add more value to most users: V Internet > V Proprietary Where: V Proprietary = Value of a proprietary network V Internet = Value of Internet network
  • 23. The “Network Effect” You need to buy a flight, and can call around to airlines (phone) or use a travel search engine on the Internet. You might rank the value of services as follows: Where: V Internet = Transaction Value of Internet Network V Phone = Transaction Value of Travel Agent Service V Internet > V Phone
  • 24. “ Inverse Network Effect” Some networks decrease in value when they exceed a certain size. Whether a corporate board, a support group, or an exclusive club, Some networks decrease in value as size increases, beyond some point. Sometimes less is more. Beyond their optimal size, These networks exhibit the following behavior: Why? In support groups for example, there is only so much time for each person to speak. More people, less speaking for each, plus the affinity may decrease.
  • 25. Economics of Security V = B - C Basic Model Sigmas ( Σ’s) ommited but assumed henceforward.
  • 26. Economics of Security Where: SI = Security Investments L = Losses C’ = C – SI – L (all costs except SI & L) Basic Model V = B - C’ - SI - L Security Model V = B - C
  • 27. Economics of Security Minimize Security Costs = SI + L The Fundamental Security Risk Management Function
  • 28. Loss $ Security Investment $ Economics of Security 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve)
  • 29. Loss $ Security Investment $ Economics of Security 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP
  • 30. Loss $ Economics of Security Security Investment $ 0 Optimal Security Investment occurs where $1 of Investment reduces $1 in losses, tangential to 45 degree line.
  • 31. Economics of deterrence Minimize the Hacker’s Gain Minimize V = B - C’ - SI - L For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing Penalties and imprisonment, for example.
  • 32. Hacker Economics NPV = B - C’ - SI - L Your Loss
  • 33. Hacker Economics V = B - C’ - SI - L Your Loss Is the Hacker’s Gain V = B - C’ - SI - L
  • 34. Hacker Economics V = B - C’ - SI - L Your Loss Is the Hacker’s Gain V = B - C’ - SI - L Criminal hacking for financial gain is worse than a zero sum game. It creates no value and adds great costs to the system.
  • 35. Economics of deterrence Minimize V = B - C’ - SI - L Minimize the Hacker’s Gain
  • 36. Economics of deterrence Minimize the Hacker’s Gain Minimize V = B - C’ - SI - L For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing Penalties and imprisonment, for example.
  • 37. Supply Chain Policy Objective: reduce malicious code in products Supply Chain Economics NPV = B - C’ - SI - L Hackers Like High Benefit/Low Cost of Embedded Malcode
  • 38.
  • 39. Loss $ Economics of Protocols Better network protocols can drive Loss function down for most or all users. Security Investment $ 0
  • 40. Enhance Internet Architecture IPv6, DNS-SEC, BGP-SEC, SMTP Protect Other Networks/Protocols SMS/IP, POTS … Protocol Investments
  • 41. Economics of Outages If Network Shuts Down: 1) Normal operating loss goes to zero 2) Loss becomes lost V (Value of Network) V = B - C’ - SI - L Security Model L = Lost NPV
  • 42. Impact of IP Outages Where: L IP,i = lost value of Internet Protocol (IP) services failing to activity i i = a category economic activity L IP,Ecommerce = Economic Loss of IP service failure to Ecommerce i = 1 n
  • 43. Impact of IP Outages IP based economic activities spread… as surely as an apple falls from a tree with the power of a tsunami the value of the Internet increases many or most activities become vulnerable all activities which are IP dependent, trend towards a correlation of losses of 1.0 this is one of the greatest points of economic and security risk in the world
  • 44. Economics of Networks Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses)
  • 45.
  • 46. Benefits of New Model Highly granular (every transaction included) Focuses on value to each party from their standpoint Accurate Simple Network architecture independent Scales from one user to one or all networks Subsets of users can be analyzed No double counting of benefits Consistent with existing cost accounting methods (e.g. amortizing costs over time) Consistent with profit and loss accounting Can be applied as foundation model for other network, security and policy problems (deterrence, outages, etc.)
  • 47. Questions About Model Is this a new universal model for network valuation? Why or why not? Does it equally apply to off-line social networks (e.g. trade associations) as on-line networks? Can it be used to value other relationships between individuals, or between creatures in nature? Should it be called an Economic Model of Relationships instead of an Economic Model of Networks?
  • 48. Possible Next Steps Empirical work to estimate Benefits and Costs in various networks or for various companies, countries. New derivatives of model can be developed to examine problems such as Net Neutrality and internet service pricing policies, and issues of privacy.
  • 49. Economics Of Networks And Cybersecurity Rod Beckstrom Director [email_address]

Notes de l'éditeur

  1. Image: Singapore Blogosphere Author(s): Steven McDermott Institution: Institute of Communications Studies, University of Leeds Year: 2008 URL: http://singabloodypore.rsfblog.org/tag/Blogosphere Project Description: Steven McDermott&apos;s research is situated within the wider framework of the internet being the greatest force for democratisation the world has ever seen (Pitrodi, 1993), and at the same time another means for disseminating propaganda, fear and intimidation (Rodan, 1997). He analyses the discourses and styles of discourse of the Singapore political blogosphere. He asks &apos;which blogs are the keyplayers?&apos; and &apos;what discourses and styles of discourse appear in the Singapore political blogosphere?&apos; Steven McDermott has targeted blogs using social network analysis uncovering the key players of the Singapore political blogs with higher levels of &apos;closeness centrality&apos; and &apos;betweenness centrality&apos; (Nooy et al., 2005). An exploratory analysis of the position that the non-democratic nature of Singapore society shapes the development of online public spheres. It questions whether the internet engenders democracy or the dissemination of propaganda, fear, and intimidation. This network visualization depicts the Singapore blogosphere in 2008. The red lines refer to links between the 1239 analyzed blogs.