Threat and vulnerability risk assessment for the insurance industry

被引:0
|
作者
Trainor, T [1 ]
Caprari, K [1 ]
Green, C [1 ]
Roth, J [1 ]
Unger, C [1 ]
机构
[1] US Mil Acad, W Point, NY USA
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The terrorist attacks of September 11(th), 2001 significantly changed the American view of security. AIG Consultants, Inc. (AIGC), a member company of American International Group, Inc. asked the Engineering Management program at the United States Military Academy (USMA) to develop a method to quantify the risks from potential terrorist events to clients. The methodology uses multi-objective decision analysis techniques to weight and assess risk in eight defined areas. These areas are assessed with user responses to questionnaires tailored to specific industries and risk assessment scores are calculated as a weighted average of the question responses in a web application.
引用
收藏
页码:227 / 234
页数:8
相关论文
共 50 条
  • [1] eTVRA, a threat, vulnerability and risk assessment tool for eEurope
    Rossebo, Judith E. Y.
    Cadzow, Scott
    Sijben, Paul
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 467 - 471
  • [2] CYBER SECURITY: THREAT IDENTIFICATION, RISK AND VULNERABILITY ASSESSMENT
    Umberger, Harold
    Gheorghe, Adrian
    [J]. ENERGY SECURITY: INTERNATIONAL AND LOCAL ISSUES, THEORETICAL PERSPECTIVES, AND CRITICAL ENERGY INFRASTRUCTURES, 2008, : 247 - 269
  • [3] eTVRA, a threat, vulnerability and risk assessment method and tool for eEurope
    Rossebo, Judith E. Y.
    Cadzow, Scott
    Sijben, Paul
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 925 - +
  • [4] Construction of information network vulnerability threat assessment model for CPS risk assessment
    Xiong, Juxia
    Wu, Jinzhao
    [J]. COMPUTER COMMUNICATIONS, 2020, 155 : 197 - 204
  • [5] Threat and vulnerability risk assessment for existing subway stations: A simplified approach
    Avci, Onur
    Ozbulut, Osman
    [J]. CASE STUDIES ON TRANSPORT POLICY, 2018, 6 (04) : 663 - 673
  • [6] The inhospitable vulnerability: A need for cybersecurity risk assessment in the hospitality industry
    Chen, Hsiangting Shatina
    Fiscus, Joseph
    [J]. JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY, 2018, 9 (02) : 223 - 234
  • [7] Semi-Automated Threat, Vulnerability & Risk Assessment (TVRA) for Medical Devices
    Moukafih, Nabil
    Zhang, Hongsen
    Epiphaniou, Gregory
    Maple, Carsten
    Taylor, Steve
    Carmichael, Laura
    [J]. 17TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS, PETRA 2024, 2024, : 687 - 693
  • [8] Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment
    Malik, Adeel A.
    Tosh, Deepak K.
    [J]. 2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 168 - 173
  • [9] Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
    Galar, Zbigniew
    Sadowski, Adam
    [J]. DEFENCE AND SECURITY ANALYSIS, 2023, 39 (01): : 111 - 117
  • [10] Cyber threat landscape faced by financial and insurance industry
    Choo, Kim-Kwang
    [J]. TRENDS AND ISSUES IN CRIME AND CRIMINAL JUSTICE, 2011, (408):