
Indexed in
License and use
Citations
Analysis of institutional authors
Sanchez-Garcia, Isaac DCorresponding AuthorFeliu, Tomas SanAuthorCalvo-Manzano, Jose AAuthorBuilding a cyber risk treatment taxonomy
Publicated to:Cluster Computing-The Journal Of Networks Software Tools And Applications. 28 (3): 205- - 2025-06-01 28(3), DOI: 10.1007/s10586-024-04899-1
Authors: Sanchez-Garcia, Isaac D; Feliu, Tomas San; Calvo-Manzano, Jose A
Affiliations
Abstract
Cyber risk treatment is a crucial stage of cyber risk management. During the risk treatment stage, countermeasures are applied to reduce the impact and likelihood of cyber risks. These countermeasures are categorized according to cybersecurity risk taxonomies such as CIS 8, NIST CSF taxonomy and MITRE D3fend. These taxonomies are especially designed to align with established risk management methodologies, models or frameworks (e.g., ISO 27001 or NIST 800-30). However, these countermeasure taxonomies have a number of problems: (a) they are complex to apply, (b) they each have their own structure and are, therefore, not standardized, (c) they have limited scopes of application, and (d) there are frequent changes in cybersecurity risks that impair countermeasures. To solve the above problems, a taxonomy of cybersecurity risk countermeasures, called Cyber Risk Treatment Taxonomy (CRTT), has been built leveraging the strengths of existing cybersecurity countermeasure taxonomies. We adopted the European Commission's Science and Knowledge Service model, which is based on Whittaker & Breininger's knowledge management taxonomy development framework, specifically adapted to the cybersecurity domain. The proposed cybersecurity countermeasure taxonomy can be applied without adhering to a specific risk management methodology, model or framework, although it is compatible with most existing methodologies, models and frameworks. The results include a taxonomy of 229 countermeasures, categorized into 19 second-level and five first-level taxa. This taxonomy was applied in an access management case study implemented at a banking organization. The steps described by Yin were used as a guide to drive the case study. The organization previously applied 12 countermeasures. As a result of the application of CRTT, however, six additional countermeasures were identified. Therefore, the organization considered that CRTT was a valuable resource to help organizations select and implement appropriate countermeasures based on their specific cybersecurity needs and decided to continue to apply the CRTT as part of a pilot program.
Keywords
Quality index
Bibliometric impact. Analysis of the contribution and dissemination channel
The work has been published in the journal Cluster Computing-The Journal Of Networks Software Tools And Applications due to its progression and the good impact it has achieved in recent years, according to the agency WoS (JCR), it has become a reference in its field. In the year of publication of the work, 2025, it was in position 77/258, thus managing to position itself as a Q1 (Primer Cuartil), in the category Computer Science, Information Systems.
Impact and social visibility
Leadership analysis of institutional authors
There is a significant leadership presence as some of the institution’s authors appear as the first or last signer, detailed as follows: First Author (SANCHEZ GARCIA, ISAAC DANIEL) and Last Author (CALVO-MANZANO VILLALON, JOSE ANTONIO).
the author responsible for correspondence tasks has been SANCHEZ GARCIA, ISAAC DANIEL.