Research Article

A Data-Driven Approach to Cyber Risk Assessment

Table 1

Considered threats with the corresponding likelihood values.

IDThreatLikelihood

1Malware0.98
2Web-based attacks0.67
3Denial of services0.53
4Malicious insiders0.40
5Phishing and social eng.0.69
6Malicious code0.58
7Stolen devices0.43
8Ransomware0.27
9Botnets0.63