Strategic Approaches in Network Communication and Information Security Risk Assessment

N Alsafwani, Y Fazea, F Alnajjar - Information, 2024 - mdpi.com
Risk assessment is a critical sub-process in information security risk management (ISRM)
that is used to identify an organization's vulnerabilities and threats as well as evaluate …

MITRE ATT&CK-driven cyber risk assessment

M Ahmed, S Panda, C Xenakis… - Proceedings of the 17th …, 2022 - dl.acm.org
Assessing the risk posed by Advanced Cyber Threats (APTs) is challenging without
understanding the methods and tactics adversaries use to attack an organisation. The …

Systematic analysis of automated threat modelling techniques: Comparison of open-source tools

D Granata, M Rak - Software quality journal, 2024 - Springer
Companies face increasing pressure to protect themselves and their customers from security
threats. Security by design is a proactive approach that builds security into all aspects of a …

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

M Dekker, L Alevizos - Security and Privacy, 2024 - Wiley Online Library
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …

An integrated approach to cyber risk management with cyber threat intelligence framework to secure critical infrastructure

H El Amin, AE Samhat, M Chamoun, L Oueidat… - … of Cybersecurity and …, 2024 - mdpi.com
Emerging cyber threats' sophistication, impact, and complexity rapidly evolve, confronting
organizations with demanding challenges. This severe escalation requires a deeper …

[PDF][PDF] Study on security risks of e-banking system

G Mogos, NSM Jamail - Indonesian Journal of Electrical Engineering …, 2021 - academia.edu
Online banking and other e-banking modes are a very convenient way to banking in terms of
speed, convenience and delivery costs, but they have brought many risks alongside them …

[PDF][PDF] Logic bomb: An insider attack

PS Dusane, Y Pavithra - International Journal, 2020 - academia.edu
Cyberattacks are one of the biggest threats to the Computer World. Security researchers and
professionals are continuously making various efforts to prevent such attacks. Most of the …

Blockchain-based multi-organizational cyber risk management framework for collaborative environments

H El Amin, L Oueidat, M Chamoun, AE Samhat… - International Journal of …, 2024 - Springer
Along with the increasing damage of cyberattacks, cyber risk management remains one of
the most crucial proactive measures. Risk management aims to identify potential risks …

[PDF][PDF] Information security culture model for malaysian organizations: A review

A Nasir, RA Arshah, MR Ab Hamid, S Fahmy… - International …, 2020 - academia.edu
ABSTRACT The establishment of Information Security Culture (ISC) has been
recommended for improving employees' information security in the organization. To date …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …