Page 188 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 188

2019 ITU Kaleidoscope Academic Conference




           [24]  J. Mullins, “The eight failures that caused the Gulf   [33]  G. Zheng, G.Zhang, W.Yang, C.Vali, R. Shankaran,
                 oil spill”, New Scientist, Sep. 8, 2010 available:   M.Orgun, “From WannaCry to WannaDie: Security
                 https://www.newscientist.com/article/dn19425-the-  Trade-offs and design for implantable medical
                 eight-failures-that-caused-the-gulf-oil-spill .    devices”, IEEE, 17th International Symposium on
                                                                    Communications and Information Technologies,
           [25]  S. Morgan, “2018 Cybersecurity Market Report”,     25-27 Sept 2017. Available
                 Cybersecurity Ventures, May 31, 2017,\. Available:   https://ieeexplore.ieee.org/document/8261228 .
                 https://cybersecurityventures.com/cybersecurity-
                 market-report/ .                             [34]  J. Freund, J. Jones, “Measuring and Managing
                                                                    Information Risk: A FAIR Approach”, Butterworth-
           [26]  S. Morgan, “Cyber Crime Costs Projected to Reach   Heinemann, 2014. ISBN-13: 978-0124202313.
                 $2 Trillion by 2019”, Forbes, Jan. 17, 2016.
                 available:                                   [35]  Open Group, “Risk Taxonomy (O-RT)”, Open
                 https://www.forbes.com/sites/stevemorgan/2016/01/  Group Technical Standards, Version 2.0, 18-Oct-
                 17/cyber-crime-costs-projected-to-reach-2-trillion-  2013. Available
                 by-2019 .                                          https://publications.opengroup.org/c13k .

           [27]  S. Morgan, “One Million Cybersecurity Job    [36]  Open Group, “Risk Analysis (O-RA)”, Open Group
                 Openings in 2016”, Forbes, Jan. 2, 2016. Available:   Technical Standards, 18-Oct-2013. Available
                 https://www.forbes.com/sites/stevemorgan/2016/01/  https://publications.opengroup.org/c13g .
                 02/one-million-cybersecurity-job-openings-in-
                 2016/.                                       [37]  DoCRA Council, “Duty of Care Risk Analysis
                                                                    Standard”, Version 0.5, April, 2018. Available
           [28]  P. Sawers, “Global cybersecurity workforce to be   https://docraprod.wpengine.com/wp-
                 short 1.8 Million by 2022”, Venture Beat, June 7,   content/uploads/2018/04/Duty-of-Care-Risk-
                 2017. Available:                                   Analysis-Standard-v05.pdf .
                 https://venturebeat.com/2017/06/07/global-
                 cybersecurity-workforce-to-be-short-by-1-8-  38]   C. Cronin, “The Questions a Judge will ask you
                 million-personnel-by-2022-up-20-on-2015/ .         after a Data Breach”, Borderless Cyber, Oct 2019.
                                                                    Available https://us19.borderlesscyber.org/program-
           [29]  C. Bryant, “How to justify your IT Security Budget”,   schedule/program/108/plenary-session-keynote-the-
                 17-Oct-2016. Available                             questions-a-judge-will-ask-you-after-a-data-breach .
                 https://www.risklens.com/blog/how-to-justify-your-
                 it-security-budget/ .                        [39]  Verizon, “2016 Data Breach Report”, available:
                                                                    https://www.verizonenterprise.com/resources/report
           [30]  D. Hubbard and R. Seiersen, “How to Measure        s/rp_DBIR_2016_Report_en_xg.pdf .
                 Anything in Cybersecurity Risk”. Hoboken, NJ:
                 Wiley, 2016.                                 [40]   “Integrated Adaptive Cyber Defense” available:
                                                                    https://www.iacdautomate.org/learn/ .
           [31]  C. Valasquez, et al., “Hybrid Loss Exceedance
                 Curve (HLEC) for risk assessment”, International   [41]   “OASIS Cyber Threat Intelligence (CTI) Technical
                 Symposium on Computational Civil Engineering,      Committee (TC)”. Available: https://www.oasis-
                 Iasi, Romania, May, 2013. available:               open.org/committees/tc_home.php?wg_abbrev=cti .
                 https://www.researchgate.net/profile/Alex_Barbat/p
                 ublication/259609767_Hybrid_loss_exceedance_cu  [42]  R. Piazza, J. Wunder, B. Jordan, “STIX  Version
                                                                                                   TM
                 rve_HLEC_for_risk_assessment/links/0deec52ce53     2.0”, OASIS Committee Specification, 19 July
                 c507de4000000/Hybrid-loss-exceedance-curve-        2017. Available https://www.oasis-
                 HLEC-for-risk-                                     open.org/standards#stix2.0 .
                 assessment.pdf?origin=publication_detail .
                                                              [43]  J. Wunder, M. Davidson, B. Jordan, “TAXII
                                                                                                       TM
           [32]  M. Nederlof (1994) "Comparing probabilistic        Version 2.0”, OASIS Committee Specification 01.
                 predictions with outcomes in petroleum exploration   Available http://docs.oasis-
                 prospect appraisal". Nonrenewable Resources,v.3,   open.org/cti/taxii/v2.0/cs01/taxii-v2.0-cs01.html .
                 No.3, 1994, p.183-189.














                                                          – 168 –
   183   184   185   186   187   188   189   190   191   192   193