Advertisement
Guest User

CRM

a guest
Dec 15th, 2018
100
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.27 KB | None | 0 0
  1. Cyber Risk Modeler - Rough Workflow Sketch
  2. Program Modules
  3. Data Module
  4. - Real (Import)
  5. - Synthetic (Generate)
  6. - Create Universe Skeleton
  7. Design Module
  8. - Product Sub-Module
  9. -- Coverage
  10. --- First-Party Coverage
  11. --- Third-Party Coverage
  12. --- Contract Constraints
  13. -- Structure
  14. --- Insurance Vehicle
  15. --- Incentivization
  16. - Metrics Sub-Module
  17. -- Exploitability Metrics
  18. --- Access Vector (AV)
  19. --- Access Complexity (AC)
  20. --- Authentication (Au)
  21. -- Impact Metrics
  22. --- Confidentiality Impact (C)
  23. --- Integrity Impact (I)
  24. --- Availability Impact (A)
  25. - Adversaries Sub-Module
  26. -- White Hats
  27. --- Resources
  28. --- Sophistication
  29. --- Strategy
  30. --- Population
  31. -- Black Hats
  32. --- Resources
  33. --- Sophistication
  34. --- Strategy
  35. --- Population
  36. - Economic and Regulatory Sub-Module
  37. -- Competitive Landscape
  38. -- Regulatory Instruments
  39. Test Module
  40. - Simulation Sub-Module
  41. -- Simulation Scope
  42. -- Universe Visualization
  43. -- Standard Output
  44. --- Model Certificate and Hash
  45. --- Analytical Reports
  46. ---- Pricing Reports
  47. ---- Economic Capital Reports
  48. ---- Security Strategy Reports
  49. - Validation Sub-Module
  50. -- Reconcile to Historical
  51. -- Equilibrium Identification
  52. - Credibility Approach
  53. - Model Refinement
  54. -- Parameter Calibration
  55. -- Stabilization Elastics
  56. - Finalize Model and Compile Auditables
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement