The Economics of Networks (and Beckstrom’s Law) Rod Beckstrom CEO and President 31July 2009 DEFCON Las Vegas 27Apr08
29Jul09 Addressing the Internet
29Jul09 Participating in the Internet eco-system and supporting it
Do network economics matter? Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) 29Jul09
Metcalfe’s Law 29Jul09 fax networks is larger today than ever, but less valuable because of substitutes such  as email, Fedex, UPS, PDF’s, web, etc., thus the model does not hold Where: V  = value of network  j n  = the number of end points or nodes p  = some constant V j   =  n 2  * p Historic Network Value Models
t  not  n ! 29Jul09
t  not  n ! 29Jul09
New Model: Beckstrom’s Law Economics of Networks 29Jul09 The value of a network equals the net value added to each user’s transactions, summed for all users.
V i,j   =  ΣB  - ΣC  Where: V  = value of network  j  to user  i B  = the benefit value of all transactions C  = the cost of all transactions Value of a Network to One User New Network Model 29Jul09
V  =  B  -  C V  = $26 - $16 V  = $10  If it costs $26 to buy the book in a store or $16 to buy it over the  Internet, including shipping, the net value is $10.  Online Book Purchase Case 29Jul09
V[j]  =  ΣV i,j   =  ΣB  - ΣC  Network Value is Summation of Value to All Users New Network Model 29Jul09
29J ul09 Where: ΣV i,j  = value of a network  j  to all users V i,j   = net present value of all transactions to user i  with respect  to network  j,  over any time period j   = identifies one network i   = one user of the network B i,k   = the benefit value of transaction  k  to individual  i C i,l   = the cost of transaction  l  to individual  i r k   and  r l   = the discount rate of interest to the time of transaction  k  or l t k  or  t l   = the elapsed time in years to transaction  k  or  l n,m,p   = maximum number of individuals  i  and transactions  k  and  l Beckstrom’s Law New Network Model
The “Network Effect” 29Jul09
For those networks where… The “Network Effect” 29Jul09 More users add to more total value
From the current network member perspective The “Network Effect” 29Jul09
For those networks where… The “Inverse Network Effect” 29Jul09 More users reduce total value <
From the current network member perspective The “Inverse Network Effect” 29Jul09 <
Private Golf Clubs  AARP Support groups  Costco FaceBook  Coops YPO  Your social networks Twitter Your customers Internet … Examples 29Jul09
Where: SI = Security Investments L  = Losses C’  = C – SI – L (all costs except SI & L) V  =  B  - C’ - SI  - L  Security  Model V  =  B  - C  Economics of Security Basic Model V  =  B  - C  29Jul09
Minimize Security Costs  =  SI  +  L  The Fundamental Security  Risk Management Function Economics of Security 29Jul09
Loss $ Security Investment $ 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve) Economics of Security 29Jul09
Loss $ Security Investment $ 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP Economics of Security 29Jul09
Loss $ Better network protocols can drive  Loss function down for most or all users. Security Investment $ 0 Economics of Protocols 29Jul09
Minimize the Hacker’s Gain Minimize V  =  B  -  C’  - SI  - L  For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing penalties and imprisonment, for example. Economics of Deterrence 29Jul09
Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) Economics of Networks 29Jul09
Be used to calculate or determine: The value of a network  How to optimize a company’s security investments How to optimize a country’s security investments Rigorously compare alternative security investments The economics of hacking The incredible leverage of  supply chain hacking Incentivize discovering supply chain hacks Incentivize better supply chain testing The value of re-architecting the Internet Analyze internet business models Value of having a diversity of networks Value of having redundant protocols within a network The Model Can . . . 29Jul09
Granular Scalable Subset-able Accurate Similar to P&L concepts Leverages cost accounting techniques Testable As simple as it can be but no simpler A foundation for derivative models Beckstrom’s Law Benefits 29Jul09
You have to get the data or estimate it Beckstrom’s Law Downside 29Jul09
t  not  n ! 29Jul09
Questions 29Jul09
Acknowledgments for assistance in editing/reviewing the models: Dr. Douglass Maughan, U.S. Department of Homeland Security Science and Technology Dr. Gary Becker, Senior Economist, U.S. Department of Homeland Security Dr. John “Matty” Mathieson, Stanford Research Institute  Dr. Patrick Lincoln, Stanford Research Institute 29Jul09
Thank You ! twitter.com/rodbeckstrom 29Jul09

More Related Content

PPT
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
PPT
Beckstrom's Law & The Economics Of Networks - ICANN
PPT
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
PPT
081212d Economics Of Networks
PPTX
Promises and perils of sharing economy
PPTX
Maurizio Pilu NextGen 09
PPTX
Communication disconnect
PPT
70-272 Chapter09
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Beckstrom's Law & The Economics Of Networks - ICANN
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
081212d Economics Of Networks
Promises and perils of sharing economy
Maurizio Pilu NextGen 09
Communication disconnect
70-272 Chapter09

Viewers also liked (6)

PPTX
The Network Effects
PDF
Total Cost of Ownership Evaluation for Network Centric Systems of Systems
PDF
From Selling Technology to Selling Value (2008)
PDF
Using Business Architecture to enable customer experience and digital strategy
PDF
Unit of Value: A Framework for Scaling
PDF
Bridging business analysis and business architecture - The Open Group webinar
The Network Effects
Total Cost of Ownership Evaluation for Network Centric Systems of Systems
From Selling Technology to Selling Value (2008)
Using Business Architecture to enable customer experience and digital strategy
Unit of Value: A Framework for Scaling
Bridging business analysis and business architecture - The Open Group webinar
Ad

Similar to Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009 (20)

PPTX
The internet economy business models and strategies slideshare
PPT
Rod Beckstrom cyber security speech at AFCEA 090225
PPTX
Ebusiness course english updated 17.05.2013
PPT
Economics of Information/Technology
PPTX
HRM - Group 1_065057.pptx human resource management course
PDF
Economic Moats - For Early Stage Startups and Early Stage Investors
PPT
Economics of Digital Information
PDF
27 l1
PPTX
Group-06.pptx 8888894555555559999555.MIS
PPT
Energizing Change Through Network Leadership 1225920401627479 8
PPT
Energizing Change Through Network Leadership
PPT
Week 2 - Networks and Externalities
PPTX
07 role of network effects and digital ecosystems
PPTX
Main project 1-9-90 seminar power point new
PDF
Business Essentials 11th Edition Ebert Test Bank
PPT
Digital Networks
PPTX
The internet economy slides november 2017
PPTX
Nacha 2011 Mobile Payment Fundamentals
PPTX
Pharmacoeconomitthuhhkhgfhkjgjkhdce 1,2,3.pptx
PPTX
Investment in ICT and Broadband for Economic Recovery and Long-Term Growth
The internet economy business models and strategies slideshare
Rod Beckstrom cyber security speech at AFCEA 090225
Ebusiness course english updated 17.05.2013
Economics of Information/Technology
HRM - Group 1_065057.pptx human resource management course
Economic Moats - For Early Stage Startups and Early Stage Investors
Economics of Digital Information
27 l1
Group-06.pptx 8888894555555559999555.MIS
Energizing Change Through Network Leadership 1225920401627479 8
Energizing Change Through Network Leadership
Week 2 - Networks and Externalities
07 role of network effects and digital ecosystems
Main project 1-9-90 seminar power point new
Business Essentials 11th Edition Ebert Test Bank
Digital Networks
The internet economy slides november 2017
Nacha 2011 Mobile Payment Fundamentals
Pharmacoeconomitthuhhkhgfhkjgjkhdce 1,2,3.pptx
Investment in ICT and Broadband for Economic Recovery and Long-Term Growth
Ad

Recently uploaded (20)

PDF
Integrating Porter-Lawler Theory of Motivation and Hofstede's Dimensions of N...
PDF
El futuro en e sector empresarial 2024 e
PDF
The Role of School Boards in Educational Management (www.kiu.ac.ug)
PPTX
Hospitality & tourism management.pptxHospitality & tourism management.pptx
PDF
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
PDF
audit case scenario .pdf by icai ca inter
PPTX
Enterprises are Classified into Two Categories
PPTX
PwC consulting Powerpoint Graphics 2014 templates
PDF
Shriram Finance, one of India's leading financial services companies, which o...
PDF
El futuro empresarial 2024 una vista gen
PDF
The Accidental Empire. How Google’s Founders Stumbled Into History
DOCX
Center Enamel Enabling Precision and Sustainability in the Netherlands' Advan...
PPTX
Warehouse. B pptx
PPTX
Business Research Methods- Secondary Data
PDF
the role of manager in strategic alliances
PDF
Unit 2 Electronic-Commerce Business Models.pptx
PDF
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
PPTX
organizational behavior notes prepared by sonam lama sawan lama
PDF
Nante Industrial Plug Socket Connector Sustainability Insights
PPTX
PPT Hafizullah Oria- Final Thesis Exam.pptx
Integrating Porter-Lawler Theory of Motivation and Hofstede's Dimensions of N...
El futuro en e sector empresarial 2024 e
The Role of School Boards in Educational Management (www.kiu.ac.ug)
Hospitality & tourism management.pptxHospitality & tourism management.pptx
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
audit case scenario .pdf by icai ca inter
Enterprises are Classified into Two Categories
PwC consulting Powerpoint Graphics 2014 templates
Shriram Finance, one of India's leading financial services companies, which o...
El futuro empresarial 2024 una vista gen
The Accidental Empire. How Google’s Founders Stumbled Into History
Center Enamel Enabling Precision and Sustainability in the Netherlands' Advan...
Warehouse. B pptx
Business Research Methods- Secondary Data
the role of manager in strategic alliances
Unit 2 Electronic-Commerce Business Models.pptx
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
organizational behavior notes prepared by sonam lama sawan lama
Nante Industrial Plug Socket Connector Sustainability Insights
PPT Hafizullah Oria- Final Thesis Exam.pptx

Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009

  • 1. The Economics of Networks (and Beckstrom’s Law) Rod Beckstrom CEO and President 31July 2009 DEFCON Las Vegas 27Apr08
  • 3. 29Jul09 Participating in the Internet eco-system and supporting it
  • 4. Do network economics matter? Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) 29Jul09
  • 5. Metcalfe’s Law 29Jul09 fax networks is larger today than ever, but less valuable because of substitutes such as email, Fedex, UPS, PDF’s, web, etc., thus the model does not hold Where: V = value of network j n = the number of end points or nodes p = some constant V j = n 2 * p Historic Network Value Models
  • 6. t not n ! 29Jul09
  • 7. t not n ! 29Jul09
  • 8. New Model: Beckstrom’s Law Economics of Networks 29Jul09 The value of a network equals the net value added to each user’s transactions, summed for all users.
  • 9. V i,j = ΣB - ΣC Where: V = value of network j to user i B = the benefit value of all transactions C = the cost of all transactions Value of a Network to One User New Network Model 29Jul09
  • 10. V = B - C V = $26 - $16 V = $10 If it costs $26 to buy the book in a store or $16 to buy it over the Internet, including shipping, the net value is $10. Online Book Purchase Case 29Jul09
  • 11. V[j] = ΣV i,j = ΣB - ΣC Network Value is Summation of Value to All Users New Network Model 29Jul09
  • 12. 29J ul09 Where: ΣV i,j = value of a network j to all users V i,j = net present value of all transactions to user i with respect to network j, over any time period j = identifies one network i = one user of the network B i,k = the benefit value of transaction k to individual i C i,l = the cost of transaction l to individual i r k and r l = the discount rate of interest to the time of transaction k or l t k or t l = the elapsed time in years to transaction k or l n,m,p = maximum number of individuals i and transactions k and l Beckstrom’s Law New Network Model
  • 14. For those networks where… The “Network Effect” 29Jul09 More users add to more total value
  • 15. From the current network member perspective The “Network Effect” 29Jul09
  • 16. For those networks where… The “Inverse Network Effect” 29Jul09 More users reduce total value <
  • 17. From the current network member perspective The “Inverse Network Effect” 29Jul09 <
  • 18. Private Golf Clubs AARP Support groups Costco FaceBook Coops YPO Your social networks Twitter Your customers Internet … Examples 29Jul09
  • 19. Where: SI = Security Investments L = Losses C’ = C – SI – L (all costs except SI & L) V = B - C’ - SI - L Security Model V = B - C Economics of Security Basic Model V = B - C 29Jul09
  • 20. Minimize Security Costs = SI + L The Fundamental Security Risk Management Function Economics of Security 29Jul09
  • 21. Loss $ Security Investment $ 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve) Economics of Security 29Jul09
  • 22. Loss $ Security Investment $ 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP Economics of Security 29Jul09
  • 23. Loss $ Better network protocols can drive Loss function down for most or all users. Security Investment $ 0 Economics of Protocols 29Jul09
  • 24. Minimize the Hacker’s Gain Minimize V = B - C’ - SI - L For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing penalties and imprisonment, for example. Economics of Deterrence 29Jul09
  • 25. Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) Economics of Networks 29Jul09
  • 26. Be used to calculate or determine: The value of a network How to optimize a company’s security investments How to optimize a country’s security investments Rigorously compare alternative security investments The economics of hacking The incredible leverage of supply chain hacking Incentivize discovering supply chain hacks Incentivize better supply chain testing The value of re-architecting the Internet Analyze internet business models Value of having a diversity of networks Value of having redundant protocols within a network The Model Can . . . 29Jul09
  • 27. Granular Scalable Subset-able Accurate Similar to P&L concepts Leverages cost accounting techniques Testable As simple as it can be but no simpler A foundation for derivative models Beckstrom’s Law Benefits 29Jul09
  • 28. You have to get the data or estimate it Beckstrom’s Law Downside 29Jul09
  • 29. t not n ! 29Jul09
  • 31. Acknowledgments for assistance in editing/reviewing the models: Dr. Douglass Maughan, U.S. Department of Homeland Security Science and Technology Dr. Gary Becker, Senior Economist, U.S. Department of Homeland Security Dr. John “Matty” Mathieson, Stanford Research Institute Dr. Patrick Lincoln, Stanford Research Institute 29Jul09
  • 32. Thank You ! twitter.com/rodbeckstrom 29Jul09

Editor's Notes

  • #2: Image from http://images.google.com/imgres?imgurl=http://www.caida.org/tools/measurement/skitter/Images/isps9808.gif&amp;imgrefurl=http://learn.caida.org/cds/traffic0202/Reading/Papers/Nae/index.html&amp;usg=__XLIkWQ8wac_eh6oWi-W0M3zbRYw=&amp;h=477&amp;w=745&amp;sz=193&amp;hl=en&amp;start=4&amp;tbnid=a8K1i3skHTS5WM:&amp;tbnh=90&amp;tbnw=141&amp;prev=/images%3Fq%3Dinternet%2Becosystem%26gbv%3D2%26hl%3Den