Behavioral task
behavioral1
Sample
How to Measure Anything in Cybersecurity Risk ( PDFDrive ).pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
How to Measure Anything in Cybersecurity Risk ( PDFDrive ).pdf
Resource
win10v2004-20240412-en
General
-
Target
How to Measure Anything in Cybersecurity Risk ( PDFDrive ).pdf
-
Size
13.6MB
-
MD5
f61b4edbbacc5ebf4fe7cb1316296a43
-
SHA1
f6f5e9cfde0e3508a7ad9f0240f08410dbdd2a50
-
SHA256
7b7643acb45fe04951619adee41ba635da875106dbbe461342a8108eca22f85e
-
SHA512
7c7e5f36b78eb9ff4e7fbf53c4d4490f317a387bb338eebb2d064ba6cfe3688d51f1adf7771be2d39056d6b3aa04537c0d12ea638d75aa1f0796295d468d191a
-
SSDEEP
49152:pUBO5D5szBhj7S+MAdLUAoZ3mt+YBbO9STZIg0883T/chf+cRSh8+9y:JKFhjOvqLU33mt+QbGSdDOja
Malware Config
Signatures
Files
-
How to Measure Anything in Cybersecurity Risk ( PDFDrive ).pdf.pdf
-
http://www.copyright.com
-
http://www.wiley.com/go/permissions
-
http://booksupport.wiley.com
-
http://www.wiley.com
-
http://www.washingtonpost.com/world/national-security/fbi-director-warns-of-cyberattacks-other-security-chiefs-say-terrorism-threat-has-altered/2013/11/14/24f1b27a-4d53-11e3-9890-a1e0997fb0c0_story.html
-
http://www.isc2.org
-
http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/
-
http://www.forbes.com/sites/sungardas/2014/12/31/2014-cyber-security-news-was-dominated-by-the-sony-hack-scandal-and-retail-data-breaches/#1c79203e4910
-
http://www.forbes.com/sites/symantec/2014/07/24/the-2014-internet-security-threat-report-year-of-the-mega-data-breach/#724e90a01a98
-
http://www.owasp.org/index.php/Attack_Surface_Analysis_Cheat_Sheet
-
http://www.sans.edu/research/security-laboratory/article/did-attack-surface
-
http://www.gartner.com/newsroom/id/2905717
-
http://www.dhs.gov/sites/default/files/publications/IoT%20Final%20Draft%20Report%2011-2014.pdf
-
http://www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712
-
http://www.bus.umich.edu/KresgePublic/Journals/Gartner/research/110400/110432/110432.html.
-
http://energyandresourcesdigest.com/invest-cybersecurity-2016-hack-cibr/
-
http://www.wsj.com/articles/vcs-pour-money-into-cybersecurity-startups-1429499474
-
http://www.pwc.be/en/news-publications/publications/2014/gsiss2015.html
-
http://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
-
http://www.usatoday.com/story/tech/2014/12/02/sony-hack-attack-chief-information-security-officer-philip-reitinger/19776929/
-
http://www.howtomeasureanything.com/cybersecurity
-
http://csrc.nist.gov/publications/nistpubs/800%E2%80%9330%E2%80%90rev1/sp800_30_r1.pdf
-
http://www.forbes.com/sites/greatspeculations/2015/03/30/home-depot-will-the-impact-of-the-data-breach-be-significant/#1e882f7e69ab
-
http://www.privacy.gov.au/materials/types/download/8820/6616
-
http://www.trefis.com/stock/tgt/articles/251553/aug-20data-breach-repercussions-and-falling-traffic-to-subdue-targets-results/2014%E2%80%9308%E2%80%9318
-
http://www.trefis.com/stock/hd/articles/286689/home-depot-will-the-impact-of-the-data-breach-be-significant/2015-03-27
-
http://www.wired.com/2007/03/data_breach_wil/
-
http://ftp.iza.org/dp7372.pdf
-
https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
-
https://cran.rstudio.com/index.html
-
https://www.rstudio.com/products/rstudio/download/
-
http://andrewgelman.com/2005/07/31/n_is_never_larg/
-
https://wiki.skullsecurity.org/Passwords
-
http://datadrivensecurity.info/blog/posts/2014/Dec/ponemon/
-
http://viewer.zmags.com/publication/ad9e976e#/ad9e976e/32
-
http://viewer.zmags.com/publication/90ffcc6b#/90ffcc6b/29
-
http://krebsonsecurity.com/2013/10/adobe%E2%80%90to%E2%80%90announce%E2%80%90source%E2%80%90code%E2%80%90customer%E2%80%90data-breach/
-
http://www.pcworld.com/article/219303/password_use_very_common_research_shows.html
-
http://www.jbonneau.com/doc/DBCBW14%E2%80%90NDSS%E2%80%90tangled_web.pdf
-
http://www.wiley.com/go/eula
-
http://www.wiley.com/go/permissions.Limit
-
http://geer.tinho.net/ieee/ieee.sp.geer.0307.pdf.
-
http://037SIRA.org
-
http://MITRE.org
-
http://www.washingtonpost.com/world/national-security/fbi-director-warns-of-cyberattacks-other-security-chiefs-say-terrorism-threat-has-altered/2013/11/14/24f1b27a-4d53-11e3-9890-a1e0997fb0c0_story
-
http://Fortune.com
-
http://www.forbes.com/sites/sungardas/2014/12/31/2014-cyber-
-
http://www.forbes.com/sites/symantec/2014/07/24/the-2014-internet-security-threat-report-year-of-the-mega-data-breach/#724e90a01a98.
-
http://CFO.com
-
http://ww2.cfo.com/risk-management/2015/02/lloyds-insurer-says-cyber-risks-big-cover/.
-
http://OWASP.org
-
http://www.owasp.org/index.php/Attack_Surface_
-
http://SANS.edu
-
http://036www.sans.edu/research/security-laboratory/article/did-attack-surface.
-
http://www.gartner.com/newsroom/id/2905717.
-
http://www.dhs.gov/sites/default/
-
http://ww2.cfo.com/technology/2013/11/cisos-cfos/.
-
http://www.darkreading.com/attacks-and-breaches/target-ignored-data-breach-alarms/d/d-id/1127712.
-
http://www.usatoday.com/story/tech/2014/12/02/sony-hack-attack-chief-
-
http://www.bus.umich.edu/KresgePublic/
-
http://energyandresourcesdigest.com/invest-cybersecurity-2016-hack-cibr/.
-
http://www.wsj.com/articles/vcs-pour-money-into-cybersecurity-startups-1429499474.
-
http://www.pwc.be/en/news-publications/publications/2014/gsiss2015.html.
-
http://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology.
-
http://howtomeasureanything.com
-
http://www.howtomeasureanything.com/cybersecurity.When
-
http://www.howtomeasureanything.com/cybersecurity.
-
http://www.howtomeasureanything.com
-
http://www.howtomeasureanything.com/cybersecurity.We
-
http://csrc.nist.gov/publications/nistpubs/800�30
-
http://www.forbes.com/sites/greatspeculations/2015/03/30/home-depot-will-the-impact-of-the-data-breach-be-
-
http://037s.com/stock/hd/articles/286689/
-
http://gov.au/materials/types/download/8820/6616.
-
http://037s.com/stock/tgt/articles/
-
http://www.wired.com/2007/03/data_breach_wil/.
-
http://.howtomeasureanything.com/cybersecurity
-
http://.howtomeasureanything.com/cybersecurity.
-
http://ftp.iza.org/dp7372.pdf.
-
https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf.
-
https://cran.rstudio.com/index.html.
-
https://www.rstudio.com/products/rstudio/download/.Once
-
http://beta.select
-
http://beta.post
-
http://andrewgelman.com/2005/07/31/n_is_never_larg/.
-
http://PackBuildNum110.0.0.1thing1.foo.org
-
http://a14257210.0.0.2thing2.foo.org
-
http://a14257310.0.0.3thing3.foo.org
-
http://a14257410.0.0.4thing4.foo.org
-
http://www.howtomeasureanything.com/cybersecurity,
-
http://ProbabilityManagement.org
-
http://.skullsecurity.org/Passwords.
-
http://datadrivensecurity.info/blog/posts/2014/Dec/ponemon/.
-
http://viewer.zmags.com/publication/ad9e976e#/ad9e976e/32.
-
http://ProbabilityManage-ment.org
-
http://viewer.zmags.com/publication/90ffcc6b#/90ffcc6b/29.
-
http://krebsonsecurity.com/2013/10/adobe
-
http://www.pcworld.com/article/219303/password_use_very_common_research_shows.html.
-
http://www.jbonneau.com/doc/DBCBW14
-
http://210beta.select
-
http://WILEYENDUSERLICENSEAGREEMENTGotowww.wiley.com/go/eulatoaccessWiley
- Show all
-