Գրեք սա: Analysing cyber-insurance claims to design harm-propagation trees