**Chapter 7**

[14] Vulnerability (Computing), Wikipedia [Online]. Available from: https://en.wikipedia.org/wiki/

01 November 2019]

November 2019]

2019]

2019]

Vulnerability\_(computing). [Accessed:

*Security and Privacy From a Legal, Ethical, and Technical Perspective*

https://nvd.nist.gov/ [Accessed: 01

Vulnerability Scoring System

[23] A Complete Guide to the Common

Version 2.0 [Online]. Available from: https://www.first.org/cvss/v2/guide. [Accessed: 01 November 2019]

[24] Common Vulnerability Scoring System v3.0: Specification Document [Online]. Available from: https://www. first.org/cvss/specification-document. [Accessed: 01 November 2019]

November 2019]

[15] Exposure [Online]. Available from: http://www.businessdictionary.com/ definition/exposure.html. [Accessed: 01

[16] Threat (Computer), Wikipedia [Online]. Available from: https://en. wikipedia.org/wiki/Threat\_(computer).

[Accessed: 01 November 2019]

[17] Cyber Attacks Hit the City of Johannesburg and South African Banks [Online]. Available from: https://www. thesslstore.com/blog/cyber-attacks-hitthe-city-of-johannesburg-and-southafrican-banks/. [Accessed: 01 November

[18] Harvey J, Technical Information Service. Introduction to Managing Risk [Online]. Available from: http://www. cimaglobal.com/Documents/Imported Documents/cid\_tg\_intro \_to\_managing\_ rist.apr07.pdf. [Accessed: 01 November

[19] Cybersecurity Risk: A Thorough Definition, Bitsight [Online]. Available from: https://www.bitsighttech.com/ blog/cybersecurity-risk-thoroughdefinition. [Accessed: 01 November 2019]

[20] Georgieva K, Farooq A, Dumke RR. Analysis of the risk assessment methods —A survey. In: Software Process and Product Measurement. IWSM 2009. Lecture Notes in Computer Science, Vol. 5891. Berlin, Heidelberg: Springer

[21] IT Risk Assessment—Happiest Minds [Online]. Available from: https:// www.happiestminds.com/whitepape rs/IT-risk-assessment. [Accessed: 01

[22] National Vulnerability Database (NVD) [Online]. Available from:

November 2019]

**106**
