1 Taxonomy of Operational Cyber Security Risks
Table of Contents
- Author: schneier.com
- Published: 06/14/2022
- Review: 4.88 (668 vote)
- Summary: · “Taxonomy of Operational Cyber Security Risks” · actions of people—action, or lack of action, taken by people either deliberately or accidentally
- Source: https://www.schneier.com/blog/archives/2011/08/taxonomy_of_ope.html
2 Cyber risk and cybersecurity: a systematic review of data availability
- Author: link.springer.com
- Published: 12/10/2021
- Review: 4.61 (516 vote)
- Summary: · Cyber risks are defined as “operational risks to information and technology assets that have consequences affecting the confidentiality,
- Source: https://link.springer.com/article/10.1057/s41288-022-00266-6
3 Cebula, J.J. and Young, L.R. (2010) A Taxonomy of Operational
- Author: scirp.org
- Published: 05/17/2022
- Review: 4.41 (388 vote)
- Summary: Cebula, J.J. and Young, L.R. (2010) A Taxonomy of Operational Cyber Security Risks. Technical Note CMU/SEI-2010-TN-028, Software Engineering Institute,
- Source: https://www.scirp.org/(S(i43dyn45teexjx455qlt3d2q))/reference/ReferencesPapers.aspx%3FReferenceID%3D2341125
4 A Taxonomy of Operational Risks for Cyber Security Software
- Author: podcasts.apple.com
- Published: 10/17/2021
- Review: 4.24 (355 vote)
- Summary: The taxonomy identifies and organizes the sources of operational cyber security risk into four classes: (1) actions of people, (2) systems and technology
- Source: https://podcasts.apple.com/us/podcast/a-taxonomy-of-operational-risks-for-cyber-security/id566573552%3Fi%3D1000413689748
5 Risk Taxonomy (O-RT), Version 3.0.1
- Author: pubs.opengroup.org
- Published: 12/15/2021
- Review: 4.13 (426 vote)
- Summary: Jack Freund, Cyber Assessments, Inc. Mike Jerbic, Trusted Systems Consulting Group; Eva Kuiper, The Open Group Invited Expert; John Linford, Security Forum &
- Source: https://pubs.opengroup.org/security/o-rt/
6 Evaluation of Comprehensive Taxonomies for Information … – CSIAC
- Author: csiac.org
- Published: 09/28/2021
- Review: 3.98 (571 vote)
- Summary: Threat Taxonomy for Cyber Threat Intelligence. CTI was born from the application of military intelligence doctrine to data analysis of cyberattacks. The DoD
- Source: https://csiac.org/articles/evaluation-of-comprehensive-taxonomies-for-information-technology-threats/
7 How to Guide Security Programs with Cybersecurity Risk Taxonomy
- Author: bitsight.com
- Published: 08/25/2021
- Review: 3.67 (314 vote)
- Summary: · A cybersecurity risk taxonomy is a powerful tool that identifies the risk vectors that your organization will likely face
- Source: https://www.bitsight.com/blog/how-guide-your-security-program-cybersecurity-risk-taxonomy
8 Understanding Cybersecurity Risk Management
- Author: cm-alliance.com
- Published: 09/10/2021
- Review: 3.49 (413 vote)
- Summary: · A taxonomy [i] for categorising threats, sources, and vulnerabilities can help support the risk identification process. Management should
- Source: https://www.cm-alliance.com/cybersecurity-blog/understanding-cybersecurity-risk-management
9 Cyber risk quantified and managed – PwC
- Author: pwc.com
- Published: 03/31/2022
- Review: 3.32 (261 vote)
- Summary: After a Fortune 100 company quantified cyber risks associated with its manufacturing plants, it achieved a new capability: It can now tailor its cybersecurity
- Source: https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/cyber-risk-quantification-management.html
10 A Taxonomy of Operational Cyber Security Risks Version 2 – Figshare
- Author: figshare.com
- Published: 01/16/2022
- Review: 3.11 (524 vote)
- Summary: This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk
- Source: https://figshare.com/articles/journal_contribution/A_Taxonomy_of_Operational_Cyber_Security_Risks_Version_2/6571784/1
11 Cyber-threat perception and risk management in the Swedish
- Author: sciencedirect.com
- Published: 05/15/2022
- Review: 2.88 (66 vote)
- Summary: Respondents agree that risk management has to account for cyber risk. … This report presents a taxonomy of operational cyber security risks that attempts
- Source: https://www.sciencedirect.com/science/article/pii/S0167404821000638
12 Technology and Cyber Risk Management – osfi-bsif.gc.ca
- Author: osfi-bsif.gc.ca
- Published: 06/07/2022
- Review: 2.73 (132 vote)
- Summary: · Principle 14: FRFIs should maintain a range of practices, capabilities, processes and tools to identify and assess cyber security for weaknesses
- Source: https://www.osfi-bsif.gc.ca/Eng/fi-if/rg-ro/gdn-ort/gl-ld/Pages/b13.aspx
13 A Taxonomy of Operational Cyber Security Risks Version 2
- Author: resources.sei.cmu.edu
- Published: 05/02/2022
- Review: 2.67 (105 vote)
- Summary: This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into
- Source: https://resources.sei.cmu.edu/library/asset-view.cfm%3Fassetid%3D91013
14 A taxonomy and a knowledge portal for cybersecurity
- Author: dl.acm.org
- Published: 05/19/2022
- Review: 2.63 (138 vote)
- Summary: J. J. Cebula and L. R. Young. a taxonomy of operational cyber security risks. Technical report, Software Engineering Institute, CMU, 2010
- Source: https://dl.acm.org/doi/10.1145/2612733.2612759
15 The Importance and Effectiveness of Cyber Risk Quantification
- Author: fairinstitute.org
- Published: 05/19/2022
- Review: 2.53 (175 vote)
- Summary: operational risk, as compliance to regulations alone provide only a minimum layer of security and fail to adequately protect them. Information risk has become a
- Source: https://www.fairinstitute.org/what-is-fair
16 A Taxonomy of Operational Cyber Security Risks Version 2
- Author: researchgate.net
- Published: 04/07/2022
- Review: 2.41 (142 vote)
- Summary: · This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber
- Source: https://www.researchgate.net/publication/307855392_A_Taxonomy_of_Operational_Cyber_Security_Risks_Version_2
17 A Taxonomy of Operational Cyber Security Risks – Semantic Scholar
- Author: semanticscholar.org
- Published: 12/25/2021
- Review: 2.21 (185 vote)
- Summary: · This report discusses the harmonization of the taxonomy with other risk and security activities, particularly those described by the Federal
- Source: https://www.semanticscholar.org/paper/A-Taxonomy-of-Operational-Cyber-Security-Risks-Cebula-Young/1e752a86215430f4dc59468ebf96df40fcb83b10