Mapping the coverage of security controls in cyber insurance proposal forms

Article OPEN
Woods, D ; Agrafiotis, I ; Nurse, JRC ; Creese, S (2017)
  • Publisher: Springer
  • Journal: Journal of Internet Services and Applications, volume 8, issue 1 (issn: 1867-4828, eissn: 1869-0238)
  • Related identifiers: doi: 10.1186/s13174-017-0059-y
  • Subject: Computer engineering. Computer hardware | Q | SANS20 controls | Security controls | T | Business security | ISO/IEC 27000 series | TK5101-6720 | Telecommunication | Cyber insurance | TK7885-7895 | HG

Abstract Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cyber insurance. A typical process would require an appl... View more
Share - Bookmark