Analysing cyber-insurance claims to design harm-propagation trees
With a continuously changing threat landscape, companies must be prepared for the most unforeseen cyber events. Harm originating from cyberspace varies in magnitude and type, with potential for systemic consequences. While the adoption of security controls may partially mitigate the impact of cyber-...
Main Authors: | Axon, L, Erola, A, Agrafiotis, I, Goldsmith, M, Creese, S |
---|---|
Format: | Conference item |
Published: |
IEEE
2019
|
Similar Items
-
The data that drives cyber insurance: a study into the underwriting and claims processes
by: Nurse, JRC, et al.
Published: (2020) -
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
by: Agrafiotis, I, et al.
Published: (2018) -
A system to calculate cyber-value-at-risk
by: Erola, A, et al.
Published: (2021) -
Mapping the coverage of security controls in cyber insurance proposal forms
by: Woods, D, et al.
Published: (2017) -
RicherPicture: Semi-automated cyber defence using context-aware data analytics
by: Erola, A, et al.
Published: (2017)