What are the assessment methods that can be employed to mitigate Cyber Risk
U can use systems thinking approach to map the mental models of stakeholders concerning cyber risk
@ Kwamina Ewur Banson I appreciate the answer. Thanks so much. Please, can you expatiate on the type of system thinking approach and mental models
Dear J E T Akinsola,
Please have a look at these ResearchGate links.
Conference Paper A Cyber Security Self-Assessment Method for Critical Infrast...
Article An Approach to Cyber-physical Vulnerability Assessment for I...
Article Vulnerability Assessment of Cybersecurity for SCADA Systems
Thesis A framework and theory for cyber security assessments
Article Cyber-physical Vulnerability Assessment in Manufacturing Systems
Conference Paper An Investigation on Cyber Security Threats and Security Models
Article A Review of cyber security risk assessment methods for SCADA systems
Article Cybersecurity for Critical Infrastructures: Attack and Defen...
Article MEASURING THE CYBER SECURITY RISK ASSESSMENT METHODS FOR SCADA SYSTEM
Conference Paper An Adaptive Supply Chain Cyber Risk Management Methodology
Good luck!
@Arvind Singh Thank you so much for the answers. I appreciate the links to solutions to the issues raised so much.
Hi, I am having trouble with a problem, in the field of Optimal Control and the generation of optimal time-series. Let's consider a system, whose dynamics are represented by dx/dt =...
24 February 2021 9,105 2 View
I am looking for recommendations of scales (in English or Spanish) to measure learning styles according to Bloom's taxonomy of learning. Thank you in advance!
09 February 2021 1,419 8 View
Impinger bottles are used at some applications, where the gas is cooled and the condensate is dissolved in a solvent contained in the impingers. I have always seen impingers made of glass. Why not...
03 February 2021 6,959 2 View
Prosopis juliflora is considered a noxious weed but its eradication is very costly inhivitive if no impossible ! We have very strong openion that it's spread could be chacked only if it's pods are...
25 January 2021 4,433 7 View
Does anyone have the similar issue? A line across the denature SDS gel shows up after staining with Coomassie blue and there are many lines in every lane if you take a closer look. This gel had 15...
07 January 2021 5,610 4 View
In our discipline (chemistry), annual meetings of the American Chemical Society (ACS) used to be mega-events with up to 20,000 participants. The current one will be virtual, and the organizers...
06 January 2021 1,882 5 View
What is the future of international business?
31 December 2020 5,562 40 View
What is the future of biogas in Asia?
31 December 2020 8,821 16 View
Around 10% of global carbon emissions is contributed by apparel industry?
27 December 2020 4,784 3 View
Does PhD by publication route is available to all or limited to university staff in India or abroad?
27 December 2020 5,315 4 View
Im looking for any papers, reports,articles, links etc on information on How vulnerable is water and wastewater infrastructure to cyber terrorism in an age of IoT.
24 February 2021 2,750 4 View
I am conducting a study on the effectiveness of AI towards detecting and averting digital payment fraud. What are the popular AI techniques being adopted in mitigating digital fraud and how could...
21 February 2021 3,888 4 View
I am using the 'Revised Cyber Bullying Inventory'. This instrument has 2 sub-scales (bully scale and victim scale). From the responses, they will be divided into 4 groups (pure cyberbullies, pure...
13 February 2021 5,787 4 View
dear all I am looking for on literature in Cyber Crime against children.
11 January 2021 5,099 5 View
Packaging and its impact with regard to pollution are extensively debated during the past two decades. it is expected that introducing nanotechnology for said application should considerably...
26 December 2020 6,763 6 View
Sir, The essence of your presentation is quite engaging as it touches upon partially due to surplus engagement hence felt a shortage of time. why can't we devise certain dos and don't to mitigate...
24 December 2020 7,898 3 View
Anyone has any ideas on how you could use AI/ML for real-time dynamic predictive analytics of cyber risks? There is a discussion on AI and cybersecurity, I have seen that, but if you wanted to...
15 December 2020 1,264 3 View
I'm searching a (free) software that simulates the effect of strong wind on the vulnerability a tree.
15 December 2020 8,119 3 View
I am trying to study the network traffic detection, and someone suggests me to choose CTU-13 dataset as ML model training and testing dataset. I have downloaded the CTU-13 pcap files, but I do not...
14 December 2020 7,460 1 View
Hello everyone I did the RT PCR by using cyber green as a fluorescent dye however when I run the RT PCR of my two strains of Saccharomyces cerevisiae (duplicate) then I got the result in which the...
21 November 2020 2,076 3 View