References

1. Allen, J., Kossakowski, K.P., Ford, G., Konda, S., and Simmel, D. (2000). Securing network servers. Retrieved April 15, 2019, from https://resources.sei.cmu.edu/asset_files/SecurityImprovementModule/2000_006_001_13634.pdf.

2. Allianz, 2016. Top business risks 2016. Allianz Risk Barometer.

3. AIG. Is Cyber Risk Systemic? New York: AIG; 2016.

4. Agarwal A, et al. VAST Methodology: Visual, Agile, and Simple Threat Modeling Various Interviews Prescott Valley, AZ: Transformational Opportunities; 2016.

5. Akerlof GA. The market for “Lemons”: quality uncertainty and the market mechanism. Q J Econ. 1970;84(3):488–500.

6. Alberts CJ, Dorofee AJ. Managing Information Security Risks: The OCTAVE Approach Reading, MA: Addison-Wesley; 2003.

Get Digital Asset Valuation and Cyber Risk Measurement now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.