Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Cyber Risk Modeler - Rough Workflow Sketch
- Program Modules
- Data Module
- - Real (Import)
- - Synthetic (Generate)
- - Create Universe Skeleton
- Design Module
- - Product Sub-Module
- -- Coverage
- --- First-Party Coverage
- --- Third-Party Coverage
- --- Contract Constraints
- -- Structure
- --- Insurance Vehicle
- --- Incentivization
- - Metrics Sub-Module
- -- Exploitability Metrics
- --- Access Vector (AV)
- --- Access Complexity (AC)
- --- Authentication (Au)
- -- Impact Metrics
- --- Confidentiality Impact (C)
- --- Integrity Impact (I)
- --- Availability Impact (A)
- - Adversaries Sub-Module
- -- White Hats
- --- Resources
- --- Sophistication
- --- Strategy
- --- Population
- -- Black Hats
- --- Resources
- --- Sophistication
- --- Strategy
- --- Population
- - Economic and Regulatory Sub-Module
- -- Competitive Landscape
- -- Regulatory Instruments
- Test Module
- - Simulation Sub-Module
- -- Simulation Scope
- -- Universe Visualization
- -- Standard Output
- --- Model Certificate and Hash
- --- Analytical Reports
- ---- Pricing Reports
- ---- Economic Capital Reports
- ---- Security Strategy Reports
- - Validation Sub-Module
- -- Reconcile to Historical
- -- Equilibrium Identification
- - Credibility Approach
- - Model Refinement
- -- Parameter Calibration
- -- Stabilization Elastics
- - Finalize Model and Compile Auditables
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement