Modern Cyber Risk Analytics and Management using MATLAB and Python : Part III: Risk Assessment Methodologies
Modern Cyber Risk Analytics and Management using MATLAB and Python : Part III: Risk Assessment Methodologies
Click to enlarge
Author(s): Akpose, Wole
ISBN No.: 9781971730066
Year: 202602
Format: Trade Cloth (Hard Cover)
Price: $ 181.99
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (On Demand)

Part III moves from foundational concepts to structured operational practice, presenting seven interlocking methodologies that collectively constitute a complete enterprise risk assessment cycle. The part opens in Chapter 16 with threat assessment and scoring, establishing systematic approaches for prioritising adversarial activity using structured analytic techniques, kill-chain mapping, and quantitative scoring rubrics grounded in observed threat intelligence. Chapter 17 follows with vulnerability assessment quantification, translating CVSS scores and exploit probability data into financially meaningful exposure values that risk managers can incorporate directly into budget justifications. Chapter 18 addresses asset valuation and loss magnitude quantification, one of the most practically challenging aspects of any risk assessment programme, presenting hierarchical valuation techniques that handle tangible infrastructure, data assets, and reputational exposure within a unified accounting framework. Chapter 19 examines control effectiveness measurement through empirical metrics, offering practitioners methods for moving beyond compliance checklists toward evidence-based security performance tracking. Chapter 20 provides a detailed operationalisation of the FAIR model, expanding the high-level framework of Part II into step-by-step procedures with organisational templates and worked industry examples. Chapter 21 addresses the integration of threat intelligence into analytical workflows, covering structured intelligence formats, source quality weighting, indicator decay functions, and Bayesian fusion models that combine multiple intelligence streams into coherent probability estimates. Chapter 22 synthesises all seven topic areas into a multi-factor risk cascade model, demonstrating how adversarial capability, asset vulnerability, control effectiveness, and business impact interact as compounding variables in an end-to-end quantitative risk assessment pipeline.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...