Making the Case for Cybersecurity
FIGURES
Figure 3-1: Risk claim structure................................................................................................................... 44 Figure 3-2: Risk caim with links to system facts.......................................................................................... 45 Figure 3-3: Risk measurement claims.......................................................................................................... 46 Figure 4-1: Contextualized attack objects................................................................................................... 48 Figure 5-1: Contextualized vulnerability objects......................................................................................... 50 Figure 6-1: Contextualized risk and asset objects....................................................................................... 52
Journal of Innovation 37