References

1. Allen, J., Kossakowski, K.P., Ford, G., Konda, S., and Simmel, D. (2000). Securing network servers. Retrieved April 15, 2019, from https://resources.sei.cmu.edu/asset_files/SecurityImprovementModule/2000_006_001_13634.pdf.

2. Allianz, 2016. Top business risks 2016. Allianz Risk Barometer.

3. AIG. Is Cyber Risk Systemic? New York: AIG; 2016.

4. Agarwal A, et al. VAST Methodology: Visual, Agile, and Simple Threat Modeling Various Interviews Prescott Valley, AZ: Transformational Opportunities; 2016.

5. Akerlof GA. The market for “Lemons”: quality uncertainty and the market mechanism. Q J Econ. 1970;84(3):488–500.

6. Alberts CJ, Dorofee AJ. Managing Information Security Risks: The OCTAVE Approach Reading, MA: Addison-Wesley; 2003.

Get Digital Asset Valuation and Cyber Risk Measurement now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.