2017
DOI: 10.1007/s10796-017-9808-5
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Risk Assessment and Mitigation (CRAM) Framework Using Logit and Probit Models for Cyber Insurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 39 publications
0
20
0
1
Order By: Relevance
“…This framework showed the importance of proactive and reactive barriers in reducing companies' exposure to cyber risk and quantifying the risk. Another approach to cyber risk assessment and mitigation was proposed by Mukhopadhyay et al (2019). They estimated the probability of an attack using generalised linear models, predicted the security technology required to reduce the probability of cyberattacks, and used gamma and exponential distributions to best approximate the average loss data for each malicious attack.…”
Section: Impact Datasetsmentioning
confidence: 99%
“…This framework showed the importance of proactive and reactive barriers in reducing companies' exposure to cyber risk and quantifying the risk. Another approach to cyber risk assessment and mitigation was proposed by Mukhopadhyay et al (2019). They estimated the probability of an attack using generalised linear models, predicted the security technology required to reduce the probability of cyberattacks, and used gamma and exponential distributions to best approximate the average loss data for each malicious attack.…”
Section: Impact Datasetsmentioning
confidence: 99%
“…Most attacks observed in cyberspace are common for several vertical industries because they use similar communication and data storage technologies. The paper [75] presents an overview (from the historical perspective) of attacks perpetrated against Banking, Financial Services, and Insurance, Healthcare, and e-retail industries, as well as government agencies (some aspects of administration and critical infrastructure). The main categories of attacks are malicious software, DoS, financial fraud, system penetration, theft of proprietary information, and unauthorized access.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…Content may change prior to final publication. large-scale attacks against BFSI institutions observed in the past [75] show that this sector must adapt to these and other, sometimes still undefined risks. So, banks and other financial institutions must invest more in security solutions to ensure 24/7 protection.…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…The research in Information Systems Frontiers (ISF) particularly stressed the cyber risk assessment (Mukhopadhyay et al 2019), security risk mitigation (Ye et al 2006), IT security investment (Ezhei and Ladani 2018), information security policy (Kang and Hovav 2018), and security risk management (Lee and Lee 2012). In this regard, ISF's research also focuses more on the organization and employee aspect of cybersecurity issues.…”
Section: Cybersecurity Research Literaturementioning
confidence: 99%