Quantifying Cyber Security Risk Through Interest Rate Calculation in Debt Management
Zapisane w:
| Wydane w: | International Conference on Cyber Warfare and Security (Mar 2025), p. 37 |
|---|---|
| 1. autor: | |
| Kolejni autorzy: | |
| Wydane: |
Academic Conferences International Limited
|
| Hasła przedmiotowe: | |
| Dostęp online: | Citation/Abstract Full Text Full Text - PDF |
| Etykiety: |
Nie ma etykietki, Dołącz pierwszą etykiete!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3202190990 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3202190990 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Coetzer, Christo |u "University of the Western Cape, Cape Town, South Africa | |
| 245 | 1 | |a Quantifying Cyber Security Risk Through Interest Rate Calculation in Debt Management | |
| 260 | |b Academic Conferences International Limited |c Mar 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Abstract: This paper introduces a novel Interest Rate Calculation Model for cyber security risk quantification, addressing the challenges of cyber security debt management. The Interest Rate Calculation Model fills this void by offering a tangible financial measure of cyber risk accumulation, 2. According to Bederna and Szadeczky (2023) organisations can optimise their cyber security investments by adopting a risk-based approach that minimises costs while ensuring proportionate protection aligned with business value at risk. Existing cyber security risk frameworks such as Factor Analysis of Information Risk (FAIR) (The FAIR Institute, n.d), International Organization for Standardization / International Electrotechnical Commission (ISO/IEC) 27005 (ISO/IEC 27005, 2022), and National Institute of Standards and Technology (NIST) (NIST, 2018) provide structured methodologies for risk assessment but lack real-time financial quantification. | |
| 610 | 4 | |a National Institute of Standards & Technology | |
| 653 | |a Data integrity | ||
| 653 | |a Collaboration | ||
| 653 | |a Valuation | ||
| 653 | |a Costs | ||
| 653 | |a Communication | ||
| 653 | |a Decision making | ||
| 653 | |a Empowerment | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Debt management | ||
| 653 | |a Factor analysis | ||
| 653 | |a Stakeholders | ||
| 653 | |a Interest rates | ||
| 653 | |a Cybercrime | ||
| 653 | |a Real time | ||
| 653 | |a Impact analysis | ||
| 653 | |a Risk assessment | ||
| 653 | |a Accountability | ||
| 700 | 1 | |a Leenen, Louise |u University of the Western Cape, Cape Town, South Africa | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (Mar 2025), p. 37 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3202190990/abstract/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3202190990/fulltext/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3202190990/fulltextPDF/embedded/ZKJTFFSVAI7CB62C?source=fedsrch |