Research Article
A Data-Driven Approach to Cyber Risk Assessment
Table 3
Evidences of intelligence.
| Source | Evidences | Trivial | Middle | Critical | | | | | | | | | |
| | 12 | 5 | 1 | 12 | 5 | 1 | 12 | 5 | 1 | | 13 | 1 | 2 | 12 | 5 | 1 | 12 | 5 | 1 | | 21 | 2 | 0 | 12 | 5 | 1 | 12 | 5 | 1 | | 3 | 2 | 0 | 12 | 5 | 1 | 12 | 5 | 1 | | 14 | 9 | 2 | 12 | 5 | 1 | 12 | 5 | 1 | | 5 | 1 | 0 | 12 | 5 | 1 | 12 | 5 | 1 | | 23 | 0 | 1 | 12 | 5 | 1 | 12 | 5 | 1 | | 7 | 1 | 3 | 12 | 5 | 1 | 12 | 5 | 1 |
|
|