{"response":{"docs":[{"system_create_dtsi":"2020-05-15T22:10:46Z","system_modified_dtsi":"2020-05-15T22:10:54Z","has_model_ssim":["Article"],"id":"b5644s84b","accessControl_ssim":["b5cd1fc7-8b0f-4f9f-9f2b-018f99483d1f"],"hasRelatedMediaFragment_ssim":["6w924d32n"],"hasRelatedImage_ssim":["6w924d32n"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats"],"date_uploaded_dtsi":"2020-05-15T22:10:46Z","date_modified_dtsi":"2020-05-15T22:10:46Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r35x-0f80"],"journal_title_tesim":["IT Research Symposium’19"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Gilany, Yahya","Kunapareddy, Vivek","Bakare, Adeyinka","Said, Hazem"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["As incessant cyber-attacks on organizations increase in complexity and destructiveness with the aim\r\nto disrupt services and steal information, proactive measures are critically needed to mitigate these\r\nattacks, cyber security risk assessment tops the list of measures. This study provides an overview of\r\ncybersecurity risk assessment, various types of frameworks, and the difference between qualitative\r\nand quantitative cybersecurity risk assessments. The aim of this early research is the creation of a\r\nhybrid system which integrates an existing cybersecurity risk assessment system based on the NIST framework into the Factor Analysis of Information Risk (FAIR) model, an analytic risk assessment model that enables true quantitative measurement. In this study, we propose a hybrid-assessment tool which will be used to describe and compare the impact of using NIST driven values\r\nas inputs for the resistance strength to determine the Loss Event Frequent (LEF) and Annual Loss\r\nExpectancy (ALE) of a risk scenario as opposed to using experts’ opinion as user inputs for determination of the LEF and ALE values."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-04-11"],"source_tesim":["IT Research Symposium’19"],"thumbnail_path_ss":"/downloads/6w924d32n?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6w924d32n"],"member_of_collections_ssim":["2019 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["jq085m248"],"file_set_ids_ssim":["6w924d32n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"INTEGRATING NIST FRAMEWORK INTO FAIR MODEL FOR QUANTITATIVE RISK ASSESSMENT OF CYBER THREATS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["jq085m248"],"nesting_collection__parent_ids_ssim":["jq085m248"],"nesting_collection__pathnames_ssim":["jq085m248/b5644s84b"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697097427570393088,"timestamp":"2021-04-15T09:17:09.113Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":1,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Bakare, Adeyinka","hits":1,"label":"Bakare, Adeyinka"},{"value":"Gilany, Yahya","hits":1,"label":"Gilany, Yahya"},{"value":"Kunapareddy, Vivek","hits":1,"label":"Kunapareddy, Vivek"},{"value":"Said, Hazem","hits":1,"label":"Said, Hazem"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":1,"label":"- School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2019-04-11","hits":1,"label":"2019-04-11"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"jq085m248","hits":1,"label":"jq085m248"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}