<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Kart Padur and Raimundas Matulevicius[</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Combining Information Security Risk Management and Probabilistic Risk Assessment</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>K. Padur</string-name>
          <email>kart.padur@ttu.ee</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>R. Matulevicius</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Computer Science, University of Tartu</institution>
          ,
          <addr-line>J. Liivi 2, 50409 Tartu</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>0000</year>
      </pub-date>
      <volume>0002</volume>
      <abstract>
        <p>Information security risk assessment is an important activity, which helps to explain risk exposure and to asset security need. However, on one hand, a lot of methods use the subjective measurements, which does not allow capturing accurate estimates. On other hand, application of the quantitative methods requires time and e orts. In order to mitigate their limitations, we discuss how to do some to combine both qualitative and quantitative methods for the security risk management. We illustrate this combination in the running example.</p>
      </abstract>
      <kwd-group>
        <kwd>Information Security Risk Assessment</kwd>
        <kwd>ISSRM</kwd>
        <kwd>Bayesian Network Based Attack Graphs</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Organisations want to pursue their business ambitions while operating in a
secure environment. Hence, the information security risks have to be assessed.
Today, organisations use qualitative security risk management methods, which take
value judgements as input to the analysis [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It saves time, e ort, and expenses
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. However, these methods rely on subjective judgment, focus on concepts
and principles, and do not provide monetary values [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Alternatively, the use
of quantitative probabilistic risk assessment methods, which use measured data
as input to limit subjectivity of the analysis, can be considered. However, the
process of gathering data and managing it requires more time and e ort [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In
this paper we suggest a hybrid approach where the qualitative and
quantitative method are combined together. Such a combination allows one to use the
subjective and measured data [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        The structure of the paper is the following: In Section 2 we present the
theoretical background. In Section 3 we present a combination of the qualitative
and quantitative methods and in Section 4 we illustrate their application in a
running example. Section 5 concludes the paper and present some future work.
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], FAIR approach [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], OCTAVE Allegro framework [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], COSO framework [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
There is no speci c information security risk management standard or
framework for nancial institutions. Two methods { Information System Security Risk
Management (ISSRM) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] and Bayesian Network Based Attack Graph
(BNBAG) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] { are used to assess the information security risk. In this paper
ISSRM is selected because it supports a security risk management and BNBAG
{ because it is a probabilistic risk assessment method.
2.1
      </p>
      <sec id="sec-1-1">
        <title>Information Systems Security Risk Management</title>
        <p>
          The ISSRM method [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] helps to ex-plain assets that are valuable and need
protection against the certain security risks and security countermeasures that
need to be selected to mitigate these risks. It consists of a domain model, metrics
and process for managing the security risks.
        </p>
        <p>Domain model. The domain model for ISSRM, presented in Fig. ref g1,
has three groups of concepts: asset-related concepts, risk-related concepts, and
risk-treatment related concepts. Asset-related concepts emphasize which assets
are important to be protected according to the security needs of the system.
Assets are either business assets or information system (IS ) assets. A business
asset is any information, process or skill that is necessary for an organisation. It is
characterised by the security criterion of con dentiality, availability, or integrity.
Information system assets are valuable parts of IS as they provide support for
business assets. The second group is risk-related concepts which illustrate risk
and its components. Risk is described as a threat that could exploit one or more
vulnerabilities, leading to an impact that harms assets and negates the security
criterion. A threat is a combination of a threat agent and attack method. Risk
treatment-related con-cepts describe how to treat risk based on the knowledge of
existing controls that implement security requirements which mitigate risk. Risk
treatment is the decision whether to avoid, reduce, transfer or retain the risk.
Risk treatment-related concepts are not a part of the scope of this paper.</p>
        <p>
          Metrics. ISSRM method [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] o ers metrics to calculate risk. The value
metric describes the value of a business asset considering the potential impact if
the business asset is either disclosed, modi- ed or disrupted. The security need
metric expresses the importance of the security criterion with respect to the
business asset. The likelihood metric describes the likelihood of an attack considering
the adversary's motivation and attack method sophistication. Vulnerability level
metric describes the prevalence of the vulnerability and the likelihood of exploit.
Potentiality is calculated us-ing the likelihood and vulnerability level metrics.
Impact level metric is the maximum value that is assigned to the security need
metric. Risk level metric is calculated as the product of potentiality and impact
level. These ve metrics describe risk-related concepts. In risk treatment-related
concepts, risk treatment and security requirements are estimated using risk
reduction and cost. Controls are estimated in terms of cost.
        </p>
        <p>
          Process. The process of ISSRM [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] introduces the activities to conduct
information security risk management. The pro-cess begins with understanding
the context where the organisation is operating and identifying its business and
IS assets. Next, the security objectives are determined in terms of con
dentiality, integrity, and availability based on the level of protection needed for the
assets. Then the risk is analysed and assessed. After these activities, it is
decided whether the assessment is satisfying or not. These previous steps can be
iterated in case of unsatisfying results. The following step is about risk treatment
whether to avoid, reduce, transfer, or accept the risk. Then security requirements
are to be de ned to state the needed security conditions to achieve the desired
level of security based on identi ed risks. If the treatment has been unsatisfying,
then the whole process can be started from the beginning or from risk
treatment step. The last step is about selecting and implementing controls based on
security requirements.
2.2
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Bayesian Network Based Attack Graphs</title>
        <p>
          BNBAG method [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] is a probabilistic risk assessment method which uses
Bayesian Networks (BN) to model and analyse attack graphs to assess risk. It
is based on Bayesian probability theorem which pro-vides a version to compute
conditional probabilities.
        </p>
        <p>
          Bayesian Probability Theory. Bayesian probabilistic reasoning starts
with a hypothesis, H, for which the probability of hypothesis P(H) is called
the prior belief about H. Evidence, E, is used to revise the belief about H using
the likelihood of evidence, P(HjE). The posterior belief about H in the light
of evidence is calculated [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Bayes' theorem states that the probability of the
hypothesis given the evidence is equal to the probability of the evidence given
the hypothesis times the probability of hypothesis divided by the probability of
evidence [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. There are situations where there is no information about P(E),
then marginalisation, i.e. the sum of probabilities of all events, can be used [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
If there is a strong prior belief that some hypothesis is true, then after having
gained more data that fails to support the hypothesis, Bayes' theorem will favour
the alternative hypothesis that better explains the data [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          Attack Graph. An attack graph with a structure of a tree provides a
framework to represent information system vulnerabilities and dependencies between
them. An attack graph shows the possible attack vectors to compromise a given
objective by successfully exploiting vulnerabilities in sequence [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. All the
vulnerabilities that form the attack vector must be successfully exploited. There
can be several attack paths through the system to reach the main goal. Logical
attack graphs rely on the monotonicity principle, i.e. once an attacker has gained
privileges, one will not give them away [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. Monotonicity introduces directed
acyclic graphs (DAG), i.e. there is a directed non-circular movement between the
structure of nodes [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The occurrence of an event in the attack tree is modelled
probabilistically. These models contain one or many parameters, which values
are known only with uncertainty [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ].
        </p>
        <p>
          Process. BN is a set of variables represented as nodes and the direct
dependences between the edges of these nodes. It is in the form of a DAG and has a
set of node probability tables (NPTs) [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. The process of assessing information
security risks considers four steps: (i ) identi cation of vulnerabilities and (ii )
creation of directed arcs between them to form an attack graph, (iii ) calculation
of NPTs (i.e. a table of probabilities that represent the probability distribution
of the node given its parents [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]) and (iv ) calculation of the result that is the
probability of an incident which happens if one or more vulnerabilities become
successfully exploited.
2.3
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>Method Limitations</title>
        <p>The comprehensiveness of ISSRM method and BNBAG method is di erent. Both
application of the ISSRM metrics and usage of the BNBAG method have their
limitations. On the one hand, it is di cult to determine the objective values
of the ISSRM metrics { one needs to rely on the subjective measures given by
the eld experts and the history evidences (which might be outdated and not
suitable any more for the actual assessment). The subjectivity of the input data
makes the analysis and the results of the assessment less reliable. In addition, the
ISSRM method does not take into account the potential correlations between
the system vulnerabilities.</p>
        <p>The BNBAG method covers in majority only the system vulnerability
analysis and not the other stages of the risk management. In addition, it might include
rather complex data gathering process. The capability of gathering data, which
requires time and e ort, depends on the maturity level of the organisation.</p>
        <p>In this paper we propose a hybrid method and argue that it could help to
overcome the above limitations.
3</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Combining ISSRM and BNBAG</title>
      <p>In Fig. 2, the process of assessing information security risk using the combination
of a security risk management method and a probabilistic risk assessment method
is presented. It includes 6 stages and consists of 22 steps. Before starting the risk
assessment process (a), a team of domain experts and relevant stakeholders need
to be engaged into the risk assessment process.</p>
      <p>Context and asset identi cation. Next step (b) is a creation of business
process models. The modelling activity helps (c) to identify the business assets
and their supporting system assets.</p>
      <p>Security objective identi cation. Next, one needs to de ne security needs
of the business assets (d ). This is done in terms of con dentiality, integrity, or
availability.</p>
      <p>
        Threat modelling includes analysis of the security threats. One needs to
identify the relevant threat agents ((e) and explain the possible attack methods
((f ). In literature there exist a number of studies, taxonomies, and libraries to
support his stage, e.g., ENISA Threat Landscape Report [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] or Europol Report
[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], MITRE's ATT&amp;CK taxonomy [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], Threat Agent Library by Intel
Corporation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and ENISA taxonomy [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Next step (g) is the measurement of the
likelihood of a threat. Hence one needs to gather input from experts.
      </p>
      <p>
        Vulnerability analysis. There exists a number of vulnerability taxono-mies
(e.g., OWASP Top 10 [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], Seven Pernicious Kingdoms [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], Common
Vulnerabilities and Exposures [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]) that one could apply for probabilistic assessment.
The key question is whether the organisation is capable of gathering the
relevant data (h). Vulnerability scanning tools, e.g., Nessus tools [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], OpenVAS
[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], can be used to gather information. Then the context related
vulnerabilities and their prevalence (i.e., the quantity of the certain vulnerability found in
tested network and applications) have to be de ned (i ). Data about the
dependencies between the vulnerabilities have to be found (j ); possible methods could
include constraint-based algorithms based on inductive causation [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], or
scorebased algorithms [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. Once the potential dependencies between vulnerabilities
are de ned (k ) and visualised on attack graphs (l ), the data about the likelihood
of exploit of each vulnerability has to be gathered (m). The (n) probability of
a vulnerability is the probability of prevalence multiplied with the likelihood of
exploit. The (o) probabilities of dependent vulnerabilities are the marginal
probabilities of the vulnerabilities. It is possible to update the posterior probabilities
using the Bayes' theorem if new data is gathered (p).
      </p>
      <p>Threat event and impact analysis. Scenario-based threat modelling can
be used. The scenario-based threat modelling (q) should consider a potential
threat agent with an attack method to exploit a vulnerability. The potentiality
of a threat event is the product of the likelihood of the threat and the probability
of the vulnerability (r ). Impact is considered in terms (s) of con dentiality,
integrity, and availability and de ned as a value of impact (t).</p>
      <p>Risk evaluation. The risk level value is the product of the potentiality of
a threat event and the impact value (u). The scenarios have to be prioritised
according to the calculated risk level (v ).</p>
    </sec>
    <sec id="sec-3">
      <title>Illustrative Example</title>
      <p>
        Context and asset identi cation. In order to illustrate the proposed
alignment, we consider an extract of the outsourcing process in nancial institution
[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. More speci cally we will analyse the outsourcing agreement storing process,
shown in Fig. 3.
      </p>
      <p>
        Threat analysis. According to the ISSRM domain model [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], a threat
describes a threat agent who uses an attack method to exploit a
vulnerability of the information system asset. In the ENISA report [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], the dominating
adversarial threat agents are criminal groups and nation states. And the most
commonly used attack methods (see ENISA and Europol [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]): malware,
social engineering, distributed denial of service (DDoS), fraud attacks,
information thefts and data breaches are notable threats that nancial institutions face.
In our example we considered these security threats (see Table 1): injection
attack, unauthorised access, misuse of information system (IS), phishing, malicious
soft-ware, and information gathering.
      </p>
      <p>
        Vulnerability analysis. In the example we have considered the OWASP top
10 taxonomy [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] to characterise the vulnerabilities of the outsourcing agreement
storing. More speci cally, this includes (see Table 1): improper neutralization of
special elements in an SQL command in contract management system (CWE89),
improper authorisation in contract database (CWE285), miscon guration of
access controls in contract database (CWE16), improper neutralisation of input
during web page generation in contract management system (CWE79), existence
of known unpatched vulnerabilities in contract management system (CWE937),
and insu cient logging of failed login attempts (CWE778). Once the
vulnerabilities are identi ed, we have created the vulnerability dependency graph (following
the BNBAG guidelines) as illustrated in Fig. 4. For instance, the dependency
between CWE285 and CWE16 considers how improper authorisation depends
on miscon guration of access controls.
      </p>
      <p>
        The probability of a successful attack by an exploit of independent
vulnerability is de ned as the product of the probability of nding the vulnerability in
the system and the likelihood of its exploit. Publicly available data provided by
the OWASP project [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] is used in the outsourcing scenario for the aver-age
estimation of the vulnerability probability. The vulnerability list, which describes
the likelihood of exploit using low/medium/high (i.e., 0,2 / 0,6 / 1) is used to
estimate the likelihood of the exploit of a vulnerability [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Next the attack graph illustrates how dependencies between vulnerabilities
can be modelled during the risk assessment. An incident is de ned as the
potential compromise of security need. Then the NPTs are formed to calculate
the joint probability of the incident, taking into consideration the
dependencies between di erent vulnerability nodes. NPTs provide input for computing
the overall probability of a successful incident. NPTs for independent and
dependent vulnerabilities are presented in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] (see Fig. 4). The true (T ) value
represents the probability of an occurrence of an exploit of a certain
vulnerability. It is calculated as the probability of the vulnerability being present in the
system multi-plied with its likelihood of exploit. The false (F ) value represents
the probability of non-occurrence of such event. The calculations are based on
based on OWASP data [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] and MITRE evaluation [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>Node probabilities of dependent variables are calculated using this equation
for prior marginal probability calculation:
P(CWE285=T )=sum(P(CWE285 jCWE16 )P(CWE16 ))
P(CWE285=T )=0,15 x0,24 + 0,02 x0,76 =0,05</p>
      <p>Firstly, CWE285 is dependent on CWE16 as shown by the attack graph.
The probability of a successful attack via vulnerability CWE285 is computed
for CWE16 being either true or false. The value 0.05 as the result of the
equations indicates that there is a 5% chance that Improper authorization is true.
The vulnerabilities can be grouped according to their severity (de ned as the
probability of the vulnerability existing in the system and the likelihood of its
ex-ploit). The application of the BNBAG results in the following grouping: (1)
Security miscon guration, (2) Cross-site scripting, (3) SQL injection, (4)
Improper authoriza-tion (5) Using components with known vulnerabilities, and (5)
Insu cient security logging.</p>
      <sec id="sec-3-1">
        <title>Threat event and impact analysis. According to the ISSRM domain</title>
        <p>
          model [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], when a threat agent with an attack method successfully exploits
one or more vulnerabilities in a system, it leads to the impact that harms system
and business assets and negates the security criterion. Table 1 represents six
security risks to the outsourcing agreement storing stage where a threat agent
using the attack method successfully exploits vulnerabili-ties thus leading to the
impact. Here the threat categories are assigned using the ENISA taxonomy [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>
          Risk evaluation. The results of the security risk assessment are presented
in Table 4. Here, the six risk scenarios are evaluated with the metrics provided in
ISSRM method. Here security level is re ned using the OWASP evaluation [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ],
threat likelihood is determined after discussion with expert from the nancial
institution. For simplicity, both value and security need are assessed equally.
The evaluation range is from 1 to 5, where 1 is the lowest value and 5 is the
highest. In the real-life scenarios the metric values should be estimated based on
the history evidences or after the consultation with eld experts. In our example
we were able to determine some values (e.g., threat likelihood from experts and
vulnerability levels from historical evidences), but other ones (e.g., value and
security need) were not present.
        </p>
        <p>The results indicate that based on the security risk level, the security risks
can be prioritised as follows: (1) Phishing, (2) Injection attack and Malicious
software, (3) Misuse of information system, and (4) Unauthorized use of software
and Information gathering. This means that the potentially the Phishing should
be mitigated rst, then Injection attack and Malicious software, and so on.
5</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Concluding Remarks</title>
      <p>In this paper we analyse how qualitative and quantitative methods could be
applied to estimate the security risks. More speci cally we analyse the ISSRM
and BNBAG methods and illustrate their application in outsourcing agreement
storing process. Then we discuss how these methods could be aligned and used
together.</p>
      <p>The proposed alignment of the ISSRM method and the BNBAG method
potentially compensates their individual shortcomings. Firstly, such a hybrid
method o ers the use of both qualitative and quantitative data as input to the
analysis. If the organisation has gained a level of maturity where they have
dened the needed data, developed the gathering process, managed it and checked
the data quality, then they can use the measurable data as input to the analysis.
However, the method does not require the use of quantitative data in all parts
of the assessment process. It o ers to start with analysing the vulnerabilities
based on measurable data and then to use qualitative data in other stages of
risk assessment. Additionally, the proposed alignment could be used to consider
the potential correlation between system vulnerabilities.</p>
      <p>The aligned method is a rather comprehensible in a way that it covers
traditional security risk assessment management stages (e.g., risk identi cation,
risk analysis, and risk assessment). The method incorporates the identi cation
of relevant assets, the analysis of the potential threat agents and their attack
methods, the analysis of the vulnerabilities and vulnerability dependencies, and
the potential impact on the organisation.</p>
      <p>The future work includes validation of the proposed alignment. For instance,
we will be applying the hybrid method to elicit and assess security risks within
other business processes (expressed in di erent notations).</p>
      <p>Acknowledgement. This research has been supported by the Estonian
Research Council (grant IUT20-55).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>O</given-names>
            <surname>~unapuu</surname>
          </string-name>
          , L.:
          <article-title>Kvalitatiivne ja Kvantitatiivne Uurimisviis Sotsiaalteadustes</article-title>
          .
          <source>Ph.D. thesis</source>
          , University of Tartu (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Caralli</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stevens</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>L.R.</given-names>
          </string-name>
          , Wilson, W.E.:
          <article-title>Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process</article-title>
          . Carnegie Mellon and Software Engineering Institute (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Casey</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Threat Agent Library Helps Identify Information Security Risks, (white paper)</article-title>
          , https://pdfs.semanticscholar.org/ 391e/70510353ba762fa1580a6d9c002eefd2d86b.pdf
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4. COSO:
          <string-name>
            <surname>Enterprise Risk Management - Integrated Framework</surname>
          </string-name>
          , https://www.coso.org/Pages/erm-integratedframework.aspx
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Dubois</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heymans</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matulevicius</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A Systematic Approach to De ne the Domain of Information System Security Risk Management</article-title>
          .
          <source>In: Intentional Perspectives on Information Systems Engineering</source>
          , pp.
          <volume>289</volume>
          {
          <fpage>306</fpage>
          . Springer (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6. ENISA: Threat Taxonomy (
          <year>2016</year>
          ), https://www.enisa.europa.eu/topics/threatrisk-management/threats-and
          <article-title>-trends/enisa-threat-landscape/threattaxonomy/view</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <source>ENISA: Threat Landscape Report</source>
          <year>2018</year>
          (
          <year>2019</year>
          ), https://www.enisa.europa.eu/ publications/enisa-threat
          <source>-landscape-report-2018</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Europol:
          <article-title>Internet Organised Crime Threat Assessment (IOCTA)</article-title>
          <year>2018</year>
          (
          <year>2018</year>
          ), https://www.europol.europa.eu/activities-services/
          <article-title>main-reports/internetorganised-crime-threat-assessment-iocta-2018</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. FAIR Institute:
          <article-title>Measuring and Managing Information Risk: a FAIR Approach</article-title>
          , https://www.fairinstitute.org/fair-book
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Fenton</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neil</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Risk Assessment and Decision Analysis with Bayesian Networks</article-title>
          . Boca Raton: Taylor and Francis Group (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hubbard</surname>
            ,
            <given-names>D.W.</given-names>
          </string-name>
          :
          <article-title>How to Measure Anything: Finding the Value of \Intangibles" in Business</article-title>
          . Hoboken, New Jersey: John Wiley and Sons, Inc. (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12. ISO/IEC: ISO/IEC 27005:2018
          <string-name>
            <given-names>Information</given-names>
            <surname>Technology - Security Techniques - Information Security Risk Management</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://www.iso.org/standard/75281.html
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kelly</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Bayesian Inference for Probabilistic Risk Assessment: A Practitioner's Guidebook</article-title>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Matulevicius</surname>
          </string-name>
          , R.:
          <source>Fundamentals of Secure System Modelling</source>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>MITRE</surname>
          </string-name>
          <article-title>Corporation: MITRE ATTA&amp;CK</article-title>
          , https://attack.mitre.org
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. MITRE Corporation:
          <source>CWE List Version 3.2</source>
          (
          <issue>2018</issue>
          ), https://cwe.mitre.org/data/index.html
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>MITRE</surname>
          </string-name>
          <article-title>Corporation: CVE Common Vulnerabilities</article-title>
          and
          <string-name>
            <surname>Exposures</surname>
          </string-name>
          (
          <year>2019</year>
          ), https://cve.mitre.org
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Munoz-Gonzalez</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lupu</surname>
            ,
            <given-names>E.C.</given-names>
          </string-name>
          :
          <article-title>Bayesian Attack Graphs for Security Risk Assessment</article-title>
          . In: IST-153 Workshop on Cyber Resilience (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. National Institute of Standards and Technology: NIST Special Publication 800-30:
          <article-title>Guide for Conducting Risk Assessment</article-title>
          .
          <source>Tech. rep.</source>
          ,
          <source>NIST</source>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>O</given-names>
            <surname>ensive Security: OpenVAS Vulnerability Scanning</surname>
          </string-name>
          (
          <year>2019</year>
          ), https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>OWASP</surname>
          </string-name>
          :
          <article-title>O cial OWASP Top 10 Repository (</article-title>
          <year>2017</year>
          ), https://github.com/OWASP/Top10/tree/master/2017/datacall/analysis
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. OWASP:
          <article-title>OWASP Top 10</article-title>
          .
          <string-name>
            <surname>The Ten Most Critical Web Application Security Risks</surname>
          </string-name>
          (
          <year>2017</year>
          ), https://www.owasp.org/images/7/72/OWASP Top 10
          <article-title>-</article-title>
          <year>2017</year>
          %28en%
          <fpage>29</fpage>
          .pdf.pdf
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Padur</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Information Security Risk Assessment in the Context of Outsourcing in a Financial Institution</article-title>
          .
          <source>Master's thesis</source>
          , University of Tartu (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Pearl</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verma</surname>
            ,
            <given-names>T.S.:</given-names>
          </string-name>
          <article-title>A Theory of Inferred Causation (</article-title>
          <year>1991</year>
          ), https://ftp.cs.ucla.edu/pub/stat ser/R156.pdf
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Scutari</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Denis</surname>
            ,
            <given-names>J.B.</given-names>
          </string-name>
          :
          <article-title>Bayesian Networks with Examples in R</article-title>
          . CRC Press (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Shameli-Sendi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aghababaei-Barzegar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cheriet</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Taxonomy of Information Security Risk Assessment (ISRA)</article-title>
          .
          <source>Computers and Security</source>
          <volume>57</volume>
          ,
          <issue>14</issue>
          {
          <fpage>30</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>Tenable</given-names>
            <surname>Inc</surname>
          </string-name>
          .: The Nessus Family (
          <year>2019</year>
          ), https://www.tenable.com/products/nessus
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Tsipenyuk</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chess</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGraw</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors</article-title>
          .
          <source>IEEE Security and Privacy</source>
          <volume>3</volume>
          (
          <issue>6</issue>
          ) (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>