Research Article
A Data-Driven Approach to Cyber Risk Assessment
Table 1
Considered threats with the corresponding likelihood values.
| ID | Threat | Likelihood |
| 1 | Malware | 0.98 | 2 | Web-based attacks | 0.67 | 3 | Denial of services | 0.53 | 4 | Malicious insiders | 0.40 | 5 | Phishing and social eng. | 0.69 | 6 | Malicious code | 0.58 | 7 | Stolen devices | 0.43 | 8 | Ransomware | 0.27 | 9 | Botnets | 0.63 |
|
|