Summary: · “Taxonomy of Operational Cyber Security Risks” · actions of people—action, or lack of action, taken by people either deliberately or accidentally
3 Cebula, J.J. and Young, L.R. (2010) A Taxonomy of Operational
Author: scirp.org
Published: 05/17/2022
Review: 4.41 (388 vote)
Summary: Cebula, J.J. and Young, L.R. (2010) A Taxonomy of Operational Cyber Security Risks. Technical Note CMU/SEI-2010-TN-028, Software Engineering Institute,
4 A Taxonomy of Operational Risks for Cyber Security Software
Author: podcasts.apple.com
Published: 10/17/2021
Review: 4.24 (355 vote)
Summary: The taxonomy identifies and organizes the sources of operational cyber security risk into four classes: (1) actions of people, (2) systems and technology
Summary: Jack Freund, Cyber Assessments, Inc. Mike Jerbic, Trusted Systems Consulting Group; Eva Kuiper, The Open Group Invited Expert; John Linford, Security Forum &
Source: https://pubs.opengroup.org/security/o-rt/
6 Evaluation of Comprehensive Taxonomies for Information … – CSIAC
Author: csiac.org
Published: 09/28/2021
Review: 3.98 (571 vote)
Summary: Threat Taxonomy for Cyber Threat Intelligence. CTI was born from the application of military intelligence doctrine to data analysis of cyberattacks. The DoD
Summary: After a Fortune 100 company quantified cyber risks associated with its manufacturing plants, it achieved a new capability: It can now tailor its cybersecurity
10 A Taxonomy of Operational Cyber Security Risks Version 2 – Figshare
Author: figshare.com
Published: 01/16/2022
Review: 3.11 (524 vote)
Summary: This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk
11 Cyber-threat perception and risk management in the Swedish
Author: sciencedirect.com
Published: 05/15/2022
Review: 2.88 (66 vote)
Summary: Respondents agree that risk management has to account for cyber risk. … This report presents a taxonomy of operational cyber security risks that attempts
12 Technology and Cyber Risk Management – osfi-bsif.gc.ca
Author: osfi-bsif.gc.ca
Published: 06/07/2022
Review: 2.73 (132 vote)
Summary: · Principle 14: FRFIs should maintain a range of practices, capabilities, processes and tools to identify and assess cyber security for weaknesses
13 A Taxonomy of Operational Cyber Security Risks Version 2
Author: resources.sei.cmu.edu
Published: 05/02/2022
Review: 2.67 (105 vote)
Summary: This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into
15 The Importance and Effectiveness of Cyber Risk Quantification
Author: fairinstitute.org
Published: 05/19/2022
Review: 2.53 (175 vote)
Summary: operational risk, as compliance to regulations alone provide only a minimum layer of security and fail to adequately protect them. Information risk has become a
17 A Taxonomy of Operational Cyber Security Risks – Semantic Scholar
Author: semanticscholar.org
Published: 12/25/2021
Review: 2.21 (185 vote)
Summary: · This report discusses the harmonization of the taxonomy with other risk and security activities, particularly those described by the Federal