Widdowson et al., 2015 - Google Patents

CHEAT, an approach to incorporating human factors in cyber security assessments

Widdowson et al., 2015

View PDF
Document ID
13459267272363158741
Author
Widdowson A
Goodliff P
Publication year
Publication venue
10th IET System Safety and Cyber-Security Conference 2015

External Links

Snippet

The human element has been identified as a contributing factor in over 95% of all security incidents. Current technical risk assessment methodologies, such as the IS1-2 Supplement, go some way to quantifying the characteristics of a non-malicious insider attacks, based on a …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Ross et al. Developing cyber resilient systems: a systems security engineering approach
Mejias et al. A model of information security awareness for assessing information security risk for emerging technologies
Widdowson et al. CHEAT, an approach to incorporating human factors in cyber security assessments
Ncubukezi Human errors: A cybersecurity concern and the weakest link to small businesses
Falco et al. Confronting cyber risk: An embedded endurance strategy for cybersecurity
Alraja et al. Information security policies compliance in a global setting: An employee's perspective
Meurs et al. Deception in double extortion ransomware attacks: An analysis of profitability and credibility
Odebade et al. A comparative study of national cyber security strategies of ten nations
Watters Cybercrime and Cybersecurity
Kessler Effectiveness of the protection motivation theory on small business employee security risk behavior
Zandona et al. Going beyond compliance: a strategic framework for promoting information security in hospitals
Dorasamy et al. Cybersecurity issues among working youths in an IOT environment: A design thinking process for solution
Sivan-Sevilla Framing and governing cyber risks: Comparative analysis of US Federal policies [1996–2018]
Whitelaw et al. A Review of the Insider Threat, a Practitioner Perspective within the UK Financial Services
Wright How cyber security can protect your business: A guide for all stakeholders
Widdowson CHEAT: an updated approach for incorporating human factors in cyber-security assessments
Bhattacharya Leadership styles and information security in small businesses: An empirical investigation
Humphrey Identifying the critical success factors to improve information security incident reporting
Antony et al. Ransomware Attacks on Healthcare Systems: Case Studies and Mitigation Strategies
Cyoy Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya
Kuraku Curiosity Clicks: The Need for Security Awareness
Fatima A Qualitative Exploratory Study of Cyber Threats to Financial Organizations
Roosman Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses
Miller Security Assessment of Cloud-Based Healthcare Applications
BLACK et al. Insider Threat and White-Collar Crime in Non-Government Organisations and Industries