2013
DOI: 10.2139/ssrn.2233075
|View full text |Cite
|
Sign up to set email alerts
|

How Bad is it? – A Branching Activity Model to Estimate the Impact of Information Security Breaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 86 publications
0
6
0
Order By: Relevance
“…The tandem of BSIMM and Touchpoints provides a basis to address the global and emergent nature of software security, although some will note that collections of 'best practice' do not constitute formally evaluated methodologies [80]. Touchpoints is often presented as an ordered list in order to impart effectiveness, and while BSIMM appears to bear out this ranking, the original basis for this ordering lies with the experience of the Touchpoints developer [55].…”
Section: Swsec Practisementioning
confidence: 99%
“…The tandem of BSIMM and Touchpoints provides a basis to address the global and emergent nature of software security, although some will note that collections of 'best practice' do not constitute formally evaluated methodologies [80]. Touchpoints is often presented as an ordered list in order to impart effectiveness, and while BSIMM appears to bear out this ranking, the original basis for this ordering lies with the experience of the Touchpoints developer [55].…”
Section: Swsec Practisementioning
confidence: 99%
“…They could lead to production losses or the inability to control a plant, multimillion financial losses, and even impact stock prices [7]. One of the key problems for understanding such consequences is that OT systems are also cyber-physical systems (CPS) encompassing both computational and complex physical elements [39].…”
Section: Cybersecurity Challenges In Operational Technologymentioning
confidence: 99%
“…Much of the risk analysis associated with security events continues to be ad hoc, and reliable models for estimating the cost of adverse security activity will improve the situation [TAFW13].…”
Section: Economic Impact Of Adverse Eventsmentioning
confidence: 99%