{"id":11085,"date":"2021-02-15T01:12:12","date_gmt":"2021-02-15T01:12:12","guid":{"rendered":"https:\/\/analystprep.com\/study-notes\/?p=11085"},"modified":"2021-10-26T05:08:20","modified_gmt":"2021-10-26T05:08:20","slug":"cyber-risk-us-financial-system","status":"publish","type":"post","link":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/","title":{"rendered":"Cyber Risk and the U.S. Financial System: A Pre-Moterm Analysis"},"content":{"rendered":"<p><strong>After completing this reading, you should be able to:<\/strong><\/p>\r\n<ul>\r\n\t<li>Explain the direct costs of and the spillovers caused by a cyber-attack.<\/li>\r\n\t<li>Explain how cyber shocks can get amplified through financial networks.<\/li>\r\n\t<li>Discuss the policy responses that can be implemented against cyber events.<\/li>\r\n<\/ul>\r\n<p>Cyber-attacks are increasingly becoming a matter of concern. Recent reports show that the financial sector is the most vulnerable compared to other sectors and may experience about 300 times more cyber-attacks annually compared to other sectors. In this chapter, we explore the risks posed by cyber-attacks to the US financial system and the world in general.<\/p>\r\n<h2>The Direct Costs Of and the Spillovers Caused By a Cyber-Attack<\/h2>\r\n<p>The occurrence of a cyber event can have both direct and indirect costs on an institution.<\/p>\r\n<h3>Direct costs<\/h3>\r\n<p><strong>Confidentiality of data may be compromised:<\/strong>\u00a0Client account numbers or investment banking information, for example, could be stolen and publicized. Such events could cause significant losses to the bank involved. For instance, the bank could face a flood of suits from customers whose data has been exposed, and it may be forced to pay millions of dollars in damages. Loss of confidential trading data to competitors could trigger a loss that may not even be measurable in the long-term. On top of this, loss of data could ruin the bank\u2019s reputation and result in declining customer numbers.<\/p>\r\n<p><strong>Availability may be compromised: <\/strong>A cyber event could compromise a bank\u2019s system and lead to outages that may extend for hours or days. In these circumstances, clients and customers would be unable to access their money and other services. The bank\u2019s day-to-day operations and liquidity could also suffer if channels used to access emergency cash are compromised.<\/p>\r\n<p><strong>Integrity may be compromised:<\/strong> Systems that have been taken over by attackers could be rendered completely useless, particularly if the attackers manage to unravel and get through proprietary firewalls and defense mechanisms. Data that has been compromised may lose its relevance and lead to legal costs.<\/p>\r\n<h3>Indirect (Spillover) Costs<\/h3>\r\n<p>Cyber-attacks may specifically impair the bank&#8217;s ability in servicing its current creditors. A good example of this is when payments or accounts are missing.<\/p>\r\n<p>In general terms, cyber-attacks may cause<strong> immobilization of capital and liquidity for business partners:<\/strong> Parties engaged in business with a bank that has been hit with a cyber-attack could be unable to access payments for services rendered or even lack a channel to send resources to the bank if systems have been compromised.\u00a0<\/p>\r\n<p>In addition, any business that has deposited its funds at a bank that has been attacked may not be able to access their cash. This could affect normal operations at such firms. For instance, a firm that pays its employees through the bank may not be able to do so.<\/p>\r\n<h2>Important Characteristics of Cyber Events<\/h2>\r\n<p><strong>Intent: <\/strong>Every cyber attacker has a goal. They could be attempting to gain financially by breaching systems and diverting money to other channels. In other cases, the attacker may only be after reputational damage.<\/p>\r\n<p><strong>Technology: <\/strong>Cyber events are technological in nature, and as such, are spread through technological linkages, such as through communication networks. It is worth noting that due to the interconnected nature of systems in the digital space, a cyber event can have more widespread costs than other traditional shocks, and impact many banks simultaneously.<\/p>\r\n<p><strong>Uncertainty:\u00a0<\/strong>In some cases, a cyber event may go unnoticed for a long time, especially if the attackers intend to gain financially because they will have an incentive to prolong the attack and cart away more. In some cases, it could be hard to tell whether a bank has been attacked even after it\u2019s proven that another bank \u2013 which happens to be a close business partner \u2013 has been attacked. In some cases, some departments within a bank may be slower than others in detecting an attack.<\/p>\r\n<h2>How Cyber Shocks can get Amplified Through Financial Networks<\/h2>\r\n<p>The modern world is heavily interconnected thanks to the internet. A bank in Chicago can share information and funds with a bank in Punjab, India in just a few clicks.<\/p>\r\n<p>Over time, bank-to-bank networks have been created connecting multiple banks across boundaries. Unfortunately, these networks can amplify and propagate shocks. For instance, an attack could compromise the distribution of liquidity and lead to a contagion. An attack originally launched from within a communication network may quickly spread to other inter-bank networks such as lending channels. The spread may be even quicker if all the victims share the same system, such as a network management system.<\/p>\r\n<p>If there\u2019s uncertainty about the location of a cyber shock, its disruptive effects could be amplified significantly. For instance, if a rumor goes around that some (possibly unknown) banks or financial institutions have been compromised, customers at other banks that may not have been affected at all may rush to make preemptive withdrawals.<\/p>\r\n<p>The presence of a core periphery structure can result in a rapid spread of an attack if the core is compromised.<\/p>\r\n<h2>Policy Responses that can be Implemented Against Cyber Events<\/h2>\r\n<h3>Ex post liquidity injections<\/h3>\r\n<p>Arrangements can be made to boost the liquidity of a bank following a cyber event. This can be done via open market operations or via market-wide liquidity facilities.<\/p>\r\n<h3>Strong emphasis on ex ante resilience and contingency planning<\/h3>\r\n<p>Individual institutions should be encouraged to develop systems that are resilient with respect to cyber risk. A minimum threshold can even be set with respect to the quality of systems.<\/p>\r\n<p>Additionally, policies could be introduced requiring banks to have adequate planning for contingencies. Every institution should set in motion plans to ensure that operations are not interrupted for too long following an attack. To achieve this, there may be a need for backup systems and backup tools.<\/p>\r\n<h3>Ex ante capital requirements<\/h3>\r\n<p>A policy could be introduced requiring institutions to set aside funds that can be used to restore operations in the event of an attack. However, such a policy may not be effective in some scenarios. If an attack renders a bank\u2019s system unavailable, for example, it may be difficult to access capital already set aside until the system is restored.<\/p>\r\n<h3>Creating additional roles of the Federal Reserve or other agencies<\/h3>\r\n<p>Introducing additional roles of the Federal Reserve can help to mitigate the effects of an attack. For example, the Fed could introduce dedicated back-up facilities in core markets that can be used in case an event occurs and renders the usual facilities unavailable.<\/p>\r\n<h3>Ex ante disclosure requirements<\/h3>\r\n<p>Ex ante requirements where institutions are obliged to disclose to regulators even minor cyber events and share information with other institutions could increase resilience by reducing uncertainty and improving collective learning.<\/p>\r\n\n            <div \n                class=\"elfsight-widget-pricing-table elfsight-widget\" \n                data-elfsight-pricing-table-options=\"%7B%22layout%22%3A%22grid%22%2C%22skin%22%3A%22skin5%22%2C%22mainColor%22%3A%22rgb%2851%2C%20129%2C%20234%29%22%2C%22styleColumnBorderRadius%22%3Atrue%2C%22styleColumnBorderWidth%22%3Atrue%2C%22useHorizontalScroll%22%3Afalse%2C%22headTitle%22%3A%22Plan%20name%22%2C%22headFeatures%22%3A%5B%7B%22text%22%3A%22Feature%201%22%7D%2C%7B%22text%22%3A%22Feature%202%22%7D%5D%2C%22headTextColor%22%3A%22rgb%2823%2C%2025%2C%2026%29%22%2C%22headBackgroundColor%22%3A%22rgb%28247%2C%20247%2C%20247%29%22%2C%22toggleVisible%22%3Afalse%2C%22toggleItems%22%3A%5B%5D%2C%22toggleDefaultItem%22%3A%22%22%2C%22toggleColor%22%3A%22%22%2C%22columns%22%3A%5B%7B%22title%22%3A%22Practice%20Package%22%2C%22titleCaption%22%3A%22For%20FRM%20Part%20II%22%2C%22features%22%3A%5B%7B%22text%22%3A%22%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22%22%7D%2C%7B%22text%22%3A%22%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22%22%7D%2C%7B%22text%22%3A%22Question%20Bank%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%222%2C300%20FRM%20Part%20II%20practice%20questions%20organized%20by%20chapter%22%7D%2C%7B%22text%22%3A%22Printable%20Mock%20Exams%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%222%20mock%20exams%20for%20a%20total%20of%20160%20extra%20practice%20questions%22%7D%2C%7B%22text%22%3A%22Performance%20Tracking%20Tools%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22View%20your%20performance%20in%20attractive%20charts%22%7D%2C%7B%22text%22%3A%225%26nbsp%3BAsk-a-tutor%20Questions%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22Ask%20five%20questions%20to%20our%20tutors%20via%20live%20chat%22%7D%5D%2C%22price%22%3A%22249%22%2C%22priceCurrency%22%3A%22USD%22%2C%22button%22%3A%22Buy%20Now%22%2C%22buttonLink%22%3A%22https%3A%5C%2F%5C%2Fanalystprep.com%5C%2Fshop%5C%2Fpractice-package-for-frm-part-ii%5C%2F%22%2C%22buttonCaption%22%3A%22%22%2C%22mainColor%22%3A%22rgb%2851%2C%20129%2C%20234%29%22%2C%22priceOptions%22%3A%5B%5D%2C%22buttonOptions%22%3A%5B%5D%2C%22isFeatured%22%3Afalse%2C%22contentDivider%22%3Anull%2C%22pricePrefix%22%3A%22%22%2C%22pricePostfix%22%3A%22%22%2C%22priceCaption%22%3A%22for%20a%2012-month%20access%22%2C%22picture%22%3A%22https%3A%5C%2F%5C%2Felfsight.com%5C%2Fassets%5C%2Fpricing-table%5C%2Fexample-grid-1.jpg%22%2C%22buttonTargetBlank%22%3Afalse%2C%22ribbonText%22%3A%22%22%2C%22ribbonBackgroundColor%22%3A%22%22%2C%22ribbonTextColor%22%3A%22%22%7D%2C%7B%22title%22%3A%22Learn%20%2B%20Practice%20Package%22%2C%22titleCaption%22%3A%22For%20FRM%20Part%20II%22%2C%22features%22%3A%5B%7B%22text%22%3A%22%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22%22%7D%2C%7B%22text%22%3A%22%3Cb%3EStudy%20Notes%3C%5C%2Fb%3E%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22Over%201%2C000%20pages%20worth%20of%20study%20notes%20covering%20each%20chapter%22%7D%2C%7B%22text%22%3A%22%3Cb%3EQuestion%20Bank%3C%5C%2Fb%3E%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%222%2C300%20FRM%20Part%20II%20practice%20questions%20organized%20by%20chapter%22%7D%2C%7B%22text%22%3A%22%3Cb%3EPrintable%20Mock%20Exams%3C%5C%2Fb%3E%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%222%20mock%20exams%20for%20a%20total%20of%20160%20extra%20practice%20questions%22%7D%2C%7B%22text%22%3A%22%3Cb%3EPerformance%20Tracking%20Tools%3C%5C%2Fb%3E%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22View%20your%20performance%20in%20attractive%20charts%22%7D%2C%7B%22text%22%3A%22%3Cb%3E5%26nbsp%3BAsk-a-tutor%20Questions%3C%5C%2Fb%3E%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22Ask%20five%20questions%20to%20our%20tutors%20via%20live%20chat%22%7D%5D%2C%22price%22%3A%22399%22%2C%22priceCurrency%22%3A%22USD%22%2C%22button%22%3A%22Buy%20Now%22%2C%22buttonLink%22%3A%22https%3A%5C%2F%5C%2Fanalystprep.com%5C%2Fshop%5C%2Fpractice-package-for-frm-part-ii-2%5C%2F%22%2C%22buttonCaption%22%3A%22%22%2C%22mainColor%22%3A%22rgb%2851%2C%20129%2C%20234%29%22%2C%22priceOptions%22%3A%5B%5D%2C%22buttonOptions%22%3A%5B%5D%2C%22isFeatured%22%3Atrue%2C%22contentDivider%22%3Anull%2C%22pricePrefix%22%3A%22%22%2C%22pricePostfix%22%3A%22%22%2C%22priceCaption%22%3A%22for%20a%2012-month%20access%22%2C%22buttonTargetBlank%22%3Afalse%2C%22picture%22%3A%22https%3A%5C%2F%5C%2Felfsight.com%5C%2Fassets%5C%2Fpricing-table%5C%2Fexample-grid-2.jpg%22%2C%22ribbonText%22%3A%22Most%20Popular%22%2C%22ribbonBackgroundColor%22%3A%22%22%2C%22ribbonTextColor%22%3A%22%22%7D%2C%7B%22title%22%3A%22Unlimited%20Package%22%2C%22titleCaption%22%3A%22For%20FRM%20Part%20I%20%26%20Part%20II%22%2C%22features%22%3A%5B%7B%22text%22%3A%22FRM%20Part%20I%20%26amp%3B%20Part%20II%20Video%20Lessons%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%2296%20hours%5Cu2019%20worth%20of%20video%20lessons%20by%20Prof.%20James%20Forjan%2C%20Ph.D.%22%7D%2C%7B%22text%22%3A%22FRM%20Part%20I%20%26amp%3B%20II%26nbsp%3BStudy%20Notes%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22Over%202%2C000%20pages%20worth%20of%20study%20notes%20covering%20each%20chapter%22%7D%2C%7B%22text%22%3A%22FRM%20Part%20I%20%26amp%3B%20II%26nbsp%3BQuestion%20Banks%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%224%2C100%20practice%20questions%20organized%20by%20chapter%22%7D%2C%7B%22text%22%3A%22FRM%20Part%20I%20%26amp%3B%20II%26nbsp%3BPrintable%20Mock%20Exams%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%224%20mock%20exams%20for%20a%20total%20of%20360%20extra%20practice%20questions%22%7D%2C%7B%22text%22%3A%22Performance%20Tracking%20Tools%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22View%20your%20performance%20in%20attractive%20charts%22%7D%2C%7B%22text%22%3A%22Unlimited%26nbsp%3BAsk-a-tutor%20Questions%22%2C%22icon%22%3A%22none%22%2C%22hint%22%3A%22Ask%20questions%20to%20our%20tutors%20via%20live%20chat%22%7D%5D%2C%22price%22%3A%22699%22%2C%22priceCurrency%22%3A%22USD%22%2C%22button%22%3A%22Buy%20Now%22%2C%22buttonLink%22%3A%22https%3A%5C%2F%5C%2Fanalystprep.com%5C%2Fshop%5C%2Funlimited-package-for-frm-part-i-part-ii%5C%2F%22%2C%22buttonCaption%22%3A%22%22%2C%22mainColor%22%3A%22rgb%2851%2C%20129%2C%20234%29%22%2C%22priceOptions%22%3A%5B%5D%2C%22buttonOptions%22%3A%5B%5D%2C%22isFeatured%22%3Afalse%2C%22contentDivider%22%3Anull%2C%22pricePrefix%22%3A%22%22%2C%22pricePostfix%22%3A%22%22%2C%22priceCaption%22%3A%22for%20lifetime%20access%22%2C%22buttonTargetBlank%22%3Afalse%2C%22picture%22%3A%22https%3A%5C%2F%5C%2Felfsight.com%5C%2Fassets%5C%2Fpricing-table%5C%2Fexample-grid-3.jpg%22%2C%22ribbonText%22%3A%22%22%2C%22ribbonBackgroundColor%22%3A%22%22%2C%22ribbonTextColor%22%3A%22%22%7D%5D%2C%22elements%22%3A%5B%7B%22complexGroup%22%3A%22picture%22%2C%22name%22%3A%22Picture%22%2C%22pictureEnable%22%3Atrue%7D%2C%7B%22complexGroup%22%3A%22title%22%2C%22name%22%3A%22Title%22%2C%22titleEnable%22%3Atrue%2C%22titleCaptionColor%22%3A%22%22%2C%22titleTextColor%22%3A%22%22%2C%22titleFontSize%22%3A24%2C%22titleFontWeight%22%3A400%7D%2C%7B%22complexGroup%22%3A%22features%22%2C%22name%22%3A%22Features%22%2C%22featuresEnable%22%3Atrue%2C%22featuresStyle%22%3A%22striped%22%2C%22featuresIconColor%22%3A%22%22%2C%22featuresTextColor%22%3A%22%22%2C%22featuresAlign%22%3A%22center%22%2C%22featuresFontSize%22%3A13%7D%2C%7B%22complexGroup%22%3A%22price%22%2C%22name%22%3A%22Price%22%2C%22priceEnable%22%3Atrue%2C%22priceCaptionColor%22%3A%22%22%2C%22priceTextColor%22%3A%22%22%2C%22priceFontSize%22%3A32%2C%22priceFontWeight%22%3A600%7D%2C%7B%22complexGroup%22%3A%22button%22%2C%22name%22%3A%22Button%22%2C%22buttonEnable%22%3Atrue%2C%22buttonType%22%3A%22outline%22%2C%22buttonColor%22%3A%22%22%2C%22buttonTextColor%22%3A%22%22%2C%22buttonSize%22%3A%22medium%22%2C%22buttonCaptionColor%22%3A%22%22%7D%5D%2C%22widgetId%22%3A%222%22%7D\" \n                data-elfsight-pricing-table-version=\"2.6.1\"\n                data-elfsight-widget-id=\"elfsight-pricing-table-2\">\n            <\/div>\n            \r\n","protected":false},"excerpt":{"rendered":"<p>After completing this reading, you should be able to: Explain the direct costs of and the spillovers caused by a cyber-attack. Explain how cyber shocks can get amplified through financial networks. Discuss the policy responses that can be implemented against&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[101,6,9],"tags":[181,182],"class_list":["post-11085","post","type-post","status-publish","format-standard","hentry","category-current-issues-in-financial-markets","category-frm","category-part-2","tag-cyber-risk","tag-u-s-financial-system","blog-post","no-post-thumbnail","animate"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes<\/title>\n<meta name=\"description\" content=\"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes\" \/>\n<meta property=\"og:description\" content=\"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\" \/>\n<meta property=\"og:site_name\" content=\"CFA, FRM, and Actuarial Exams Study Notes\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-15T01:12:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-26T05:08:20+00:00\" \/>\n<meta name=\"author\" content=\"Irene R\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irene R\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\"},\"author\":{\"name\":\"Irene R\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5\"},\"headline\":\"Cyber Risk and the U.S. Financial System: A Pre-Moterm Analysis\",\"datePublished\":\"2021-02-15T01:12:12+00:00\",\"dateModified\":\"2021-10-26T05:08:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\"},\"wordCount\":1123,\"keywords\":[\"Cyber Risk\",\"U.S financial system\"],\"articleSection\":[\"Current Issues in Financial Markets\",\"FRM\",\"Part 2\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\",\"url\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\",\"name\":\"Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes\",\"isPartOf\":{\"@id\":\"https:\/\/analystprep.com\/study-notes\/#website\"},\"datePublished\":\"2021-02-15T01:12:12+00:00\",\"dateModified\":\"2021-10-26T05:08:20+00:00\",\"author\":{\"@id\":\"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5\"},\"description\":\"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.\",\"breadcrumb\":{\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/analystprep.com\/study-notes\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Risk and the U.S. Financial System: A Pre-Moterm Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/#website\",\"url\":\"https:\/\/analystprep.com\/study-notes\/\",\"name\":\"CFA, FRM, and Actuarial Exams Study Notes\",\"description\":\"Question Bank and Study Notes for the CFA, FRM, and Actuarial exams\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/analystprep.com\/study-notes\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5\",\"name\":\"Irene R\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/33caf1e1bcb63ee970b36351f165c7bc714b19614993ab9c2c8bf36273b7df48?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/33caf1e1bcb63ee970b36351f165c7bc714b19614993ab9c2c8bf36273b7df48?s=96&d=mm&r=g\",\"caption\":\"Irene R\"},\"url\":\"https:\/\/analystprep.com\/study-notes\/author\/irene\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes","description":"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes","og_description":"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.","og_url":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/","og_site_name":"CFA, FRM, and Actuarial Exams Study Notes","article_published_time":"2021-02-15T01:12:12+00:00","article_modified_time":"2021-10-26T05:08:20+00:00","author":"Irene R","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irene R","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#article","isPartOf":{"@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/"},"author":{"name":"Irene R","@id":"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5"},"headline":"Cyber Risk and the U.S. Financial System: A Pre-Moterm Analysis","datePublished":"2021-02-15T01:12:12+00:00","dateModified":"2021-10-26T05:08:20+00:00","mainEntityOfPage":{"@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/"},"wordCount":1123,"keywords":["Cyber Risk","U.S financial system"],"articleSection":["Current Issues in Financial Markets","FRM","Part 2"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/","url":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/","name":"Cyber Risk and the U.S. Financial System: A Pre-Mortem Analysis | AnalystPrep - FRM Part 2 Study Notes","isPartOf":{"@id":"https:\/\/analystprep.com\/study-notes\/#website"},"datePublished":"2021-02-15T01:12:12+00:00","dateModified":"2021-10-26T05:08:20+00:00","author":{"@id":"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5"},"description":"After completing this reading, you should be able to; Explain the direct costs of and the spillovers caused by a cyber-attack; Explain how cyber shocks can get amplified through financial networks; Discuss the policy responses that can be implemented against cyber events.","breadcrumb":{"@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/analystprep.com\/study-notes\/frm\/part-2\/cyber-risk-us-financial-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/analystprep.com\/study-notes\/"},{"@type":"ListItem","position":2,"name":"Cyber Risk and the U.S. Financial System: A Pre-Moterm Analysis"}]},{"@type":"WebSite","@id":"https:\/\/analystprep.com\/study-notes\/#website","url":"https:\/\/analystprep.com\/study-notes\/","name":"CFA, FRM, and Actuarial Exams Study Notes","description":"Question Bank and Study Notes for the CFA, FRM, and Actuarial exams","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/analystprep.com\/study-notes\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/7002f30d8f174958802c1c30b167eaf5","name":"Irene R","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/analystprep.com\/study-notes\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/33caf1e1bcb63ee970b36351f165c7bc714b19614993ab9c2c8bf36273b7df48?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/33caf1e1bcb63ee970b36351f165c7bc714b19614993ab9c2c8bf36273b7df48?s=96&d=mm&r=g","caption":"Irene R"},"url":"https:\/\/analystprep.com\/study-notes\/author\/irene\/"}]}},"_links":{"self":[{"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/posts\/11085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/comments?post=11085"}],"version-history":[{"count":9,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/posts\/11085\/revisions"}],"predecessor-version":[{"id":22720,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/posts\/11085\/revisions\/22720"}],"wp:attachment":[{"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/media?parent=11085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/categories?post=11085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/analystprep.com\/study-notes\/wp-json\/wp\/v2\/tags?post=11085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}