INSTRUMENT DESIGN FOR CYBER RISK ASSESSMENT IN INSURABILITY VERIFICATION
Article Sidebar
Open full text
Issue Vol. 8 No. 3 (2018)
-
FLOW VELOCITY MEASUREMENTS IN THE OPEN CHANNELS
Volodymyr Drevetskiy, Roman Muran4-6
-
INSTRUMENT DESIGN FOR CYBER RISK ASSESSMENT IN INSURABILITY VERIFICATION
David Nicolas Bartolini, Andreas Ahrens, Jelena Zascerinska7-10
-
MULTICRITERION ANALYSIS AND CHOOSING OF THE OPTIMAL ROUTING IN AD-HOC NETWORKS
Valeriy Bezruk, Kyrylo Halchenko11-14
-
MODELS AND METHODS OF PROCESSING OF INFORMATION ON LOADS OF ACOUSTIC SIGNALS IN TECHNICAL DIAGNOSTIC SYSTEMS
Artem Sharko15-18
-
THE CHANCES OF PRECISION ENHANCE FOR ULTRASONIC IMAGING
Tomasz Rymarczyk, Jan Sikora, Przemysław Adamkiewicz, Piotr Bożek, Michał Gołąbek19-24
-
ELECTRICAL RESISTANCE TOMOGRAPH FOR DISTRIBUTED MEASUREMENTS FOR FLOOD EMBANKMENT
Tomasz Rymarczyk, Paweł Tchórzewski, Przemysław Adamkiewicz, Jan Sikora25-28
-
MANUFACTURING PLANNING AND CONTROL SYSTEM USING TOMOGRAPHIC SENSORS
Konrad Niderla, Tomasz Rymarczyk, Jan Sikora29-34
-
METHODS FOR DETECTION ANALYSIS IN QUALITY CONTROL SYSTEM
Konrad Kania, Tomasz Rymarczyk35-38
-
NEURAL NETWORK AND CONVOLUTIONAL ALGORITH TO EXTRACT SHAPES BY E-MEDICUS APPLICATION
Tomasz Rymarczyk, Barbara Stefaniak, Przemysław Adamkiewicz39-42
-
DESIGN OF DATA ANALYSIS SYSTEMS FOR BUSINESS PROCESS AUTOMATION
Tomasz Rymarczyk, Tomasz Cieplak, Grzegorz Kłosowski, Paweł Rymarczyk43-46
-
OVERVIEW OF CURRENTLY USED WIRELESS ELECTRICAL VEHICLE CHARGING SOLUTIONS
Damian Dobrzański47-50
-
ANALYSIS OF THE FLAME PULSATION SIGNALS USING A SHORT-TIME FOURIER TRANSFORM
Żaklin Grądz51-54
-
DIGITAL TECHNOLOGIES FOR SUPPORTING THE MANAGEMENT PROCESSES OF TEACHER PROFESSIONAL GROWTH WITHIN THE DEPARTMENTS OF MANAGEMENT IN THE UNIVERSITIES OF THE REPUBLIC OF POLAND
Victor Oliynyk, Iryna M. Androshchuk55-59
-
THE PAST MEETS THE FUTURE – A MUSEUM AS A SMART BUILDING
Mirosław Dechnik60-64
-
THE INFLUENCE OF SELECTED TECHNICAL PARAMETERS ON THE RECEPTION OF RADIO WAVES
Jacek Łukasz Wilk-Jakubowski65-68
-
TWO PARALLEL WIND MEASUREMENTS AS AN ACCURATE ASSESSMENT OF LOCAL WIND ENERGY RESOURCES
Piotr Gnyp69-72
Archives
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
-
Vol. 6 No. 4
2016-12-22 16
-
Vol. 6 No. 3
2016-08-08 18
-
Vol. 6 No. 2
2016-05-10 16
-
Vol. 6 No. 1
2016-02-04 16
Main Article Content
DOI
Authors
davidnicolas.bartolini@alumnos.upm.es
Abstract
Cyber risk assessment for insurability verification has been paid a lot of research interest as cyber insurance represents a new dynamic segment of market with considerable growth potential for insurers. As customer’s practices and processes consistently lead to the final overall result, customer's behaviour has to be described in detail. The aim of the present paper is to design an instrument (questionnaire) for customer’s cyber risk assessment in insurability verification. The method for building an instrument (questionnaire) is empirical research. Empirical research is based on use of empirical evidence. A questionnaire with 11 questions is proposed.
Keywords:
References
Bartolini D., Ahrens A., Benavente-Peces, C.: Risk Assessment and Verification of Insurability. In: International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS), Madrid (Spanien). 2017, 24–26.
Eckert C.: IT Security – Concepts, Procedures and Protocols. De Gruyter Oldenbourg, 2014.
Official Journal of the European Union: General Data Protection Regulation. http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf, 2016.
Meyers M., Harris S., a Campo Rössing: CISSP: Certified Information Systems Security Professional (mitp Professional) Broschiert, 9 März 2009.
ISACA, 2012, Cobit 5 Framework.
ISO 2013. ISO/IEC 27001: 2013. Information technology – Security techniques – Information security management systems – Requirements.
ISO 2015. Information technology – Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud security services.
NIST 2008. NIST 800-123: Guide to General Server Security.
NIST 2013. NIST 800-40: Guide to Enterprise Patch Management Technologies.
NIST 2013. NIST 800-53: Security and Privacy Controls for Federal Information Systems and Organizations.
NIST 2013. NIST 500-291: NIST Cloud Computing Standards Roadmap.
Open Web Application Security Project (OWASP), 2017.
PCI/DSS, 2016. Payment Card Industry (PCI) Data Security Standard, v3.2.
Warren C., et. al.: Enterprise Information Security and Privacy, 2009, 193–199.
Article Details
Abstract views: 278
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
