Widdowson et al., 2015 - Google Patents
CHEAT, an approach to incorporating human factors in cyber security assessmentsWiddowson et al., 2015
View PDF- Document ID
- 13459267272363158741
- Author
- Widdowson A
- Goodliff P
- Publication year
- Publication venue
- 10th IET System Safety and Cyber-Security Conference 2015
External Links
Snippet
The human element has been identified as a contributing factor in over 95% of all security incidents. Current technical risk assessment methodologies, such as the IS1-2 Supplement, go some way to quantifying the characteristics of a non-malicious insider attacks, based on a …
- 241000209202 Bromus secalinus 0 title description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ross et al. | Developing cyber resilient systems: a systems security engineering approach | |
Mejias et al. | A model of information security awareness for assessing information security risk for emerging technologies | |
Widdowson et al. | CHEAT, an approach to incorporating human factors in cyber security assessments | |
Ncubukezi | Human errors: A cybersecurity concern and the weakest link to small businesses | |
Falco et al. | Confronting cyber risk: An embedded endurance strategy for cybersecurity | |
Alraja et al. | Information security policies compliance in a global setting: An employee's perspective | |
Meurs et al. | Deception in double extortion ransomware attacks: An analysis of profitability and credibility | |
Odebade et al. | A comparative study of national cyber security strategies of ten nations | |
Watters | Cybercrime and Cybersecurity | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Zandona et al. | Going beyond compliance: a strategic framework for promoting information security in hospitals | |
Dorasamy et al. | Cybersecurity issues among working youths in an IOT environment: A design thinking process for solution | |
Sivan-Sevilla | Framing and governing cyber risks: Comparative analysis of US Federal policies [1996–2018] | |
Whitelaw et al. | A Review of the Insider Threat, a Practitioner Perspective within the UK Financial Services | |
Wright | How cyber security can protect your business: A guide for all stakeholders | |
Widdowson | CHEAT: an updated approach for incorporating human factors in cyber-security assessments | |
Bhattacharya | Leadership styles and information security in small businesses: An empirical investigation | |
Humphrey | Identifying the critical success factors to improve information security incident reporting | |
Antony et al. | Ransomware Attacks on Healthcare Systems: Case Studies and Mitigation Strategies | |
Cyoy | Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya | |
Kuraku | Curiosity Clicks: The Need for Security Awareness | |
Fatima | A Qualitative Exploratory Study of Cyber Threats to Financial Organizations | |
Roosman | Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses | |
Miller | Security Assessment of Cloud-Based Healthcare Applications | |
BLACK et al. | Insider Threat and White-Collar Crime in Non-Government Organisations and Industries |