“…These parameters play a central role in the generic TVC methodology (Washington, 2009), which underlies many existing security risk assessment frameworks, and is used to manage risks in a wide range of organizations. Security risk assessment is also done by methods based on game theory (Brown, Sinha, Schlenker, & Tambe, 2016;Farraj, Hammad, Al Daoud, & Kundur, 2016;Pita et al, 2008), graph theory (Schneier, 1999), the bowtie method (de Ruijter & Guldenmund, 2016), probabilistic tools (Bamakan & Dehghanimohammadabadi, 2015;Chawdhry, 2009) and red-teaming, i.e., real-life simulation of a threat scenario.…”