2020
DOI: 10.3390/risks8020061
|View full text |Cite
|
Sign up to set email alerts
|

A Multivariate Model to Quantify and Mitigate Cybersecurity Risk

Abstract: The cost of cybersecurity incidents is large and growing. However, conventional methods for measuring loss and choosing mitigation strategies use simplifying assumptions and are often not supported by cyber attack data. In this paper, we present a multivariate model for different, dependent types of attack and the effect of mitigation strategies on those attacks. Utilising collected cyber attack data and assumptions on mitigation approaches, we look at an example of using the model to optimise the choice of mi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Looking at literature on cyber security, with regard to frequency, it is generally modeled by either a Poisson or a negative binomial distribution (Eling and Loperfido 2017). (Bentley et al 2020) suggest that a suitable way to model the effect of mitigation on the frequency of attacks, is to resort to a Poisson process.…”
Section: The Role Of Cyber Value At Riskmentioning
confidence: 99%
See 3 more Smart Citations
“…Looking at literature on cyber security, with regard to frequency, it is generally modeled by either a Poisson or a negative binomial distribution (Eling and Loperfido 2017). (Bentley et al 2020) suggest that a suitable way to model the effect of mitigation on the frequency of attacks, is to resort to a Poisson process.…”
Section: The Role Of Cyber Value At Riskmentioning
confidence: 99%
“…Another issue concerns the dependability structure of losses, requiring a model able to deal with various, but dependent, classes of damages (Bentley et al 2020). In order to model dependency structure, copulas are commonly used (Bentley et al 2020;Eling and Jung 2018).…”
Section: The Role Of Cyber Value At Riskmentioning
confidence: 99%
See 2 more Smart Citations
“…It should be mentioned, that operators providing intelligent public transport services don't spend sufficient financial sources on development, 4 security and maintenance of security systems. 5 For that reason are state departments and agencies adopting measures for mitigation, planning and 1 Cyber attack is defined as "attack on IT infrastructure in order to cause damage, or to obtain sensitive or strategically important information" (Jirásek, P., Novák, L., Požár, J. (2015) Výkladový slovník Kybernetické bezpečnosti, Prague: PA CR in Prague, Czech branch of AFCEA, p. 71).…”
Section: Introductionmentioning
confidence: 99%