{rfName}
Bu

License and use

Citations

Altmetrics

Analysis of institutional authors

Sanchez-Garcia, Isaac DCorresponding AuthorFeliu, Tomas SanAuthorCalvo-Manzano, Jose AAuthor
Share
Publications
>
Article

Building a cyber risk treatment taxonomy

Publicated to:Cluster Computing-The Journal Of Networks Software Tools And Applications. 28 (3): 205- - 2025-06-01 28(3), DOI: 10.1007/s10586-024-04899-1

Authors: Sanchez-Garcia, Isaac D; Feliu, Tomas San; Calvo-Manzano, Jose A

Affiliations

Univ Politecn Madrid, Escuela Tecn Super Ingn Informat, Campus Montegancedo s-n, Boadilla Del Monte 28660, Madrid, Spain - Author

Abstract

Cyber risk treatment is a crucial stage of cyber risk management. During the risk treatment stage, countermeasures are applied to reduce the impact and likelihood of cyber risks. These countermeasures are categorized according to cybersecurity risk taxonomies such as CIS 8, NIST CSF taxonomy and MITRE D3fend. These taxonomies are especially designed to align with established risk management methodologies, models or frameworks (e.g., ISO 27001 or NIST 800-30). However, these countermeasure taxonomies have a number of problems: (a) they are complex to apply, (b) they each have their own structure and are, therefore, not standardized, (c) they have limited scopes of application, and (d) there are frequent changes in cybersecurity risks that impair countermeasures. To solve the above problems, a taxonomy of cybersecurity risk countermeasures, called Cyber Risk Treatment Taxonomy (CRTT), has been built leveraging the strengths of existing cybersecurity countermeasure taxonomies. We adopted the European Commission's Science and Knowledge Service model, which is based on Whittaker & Breininger's knowledge management taxonomy development framework, specifically adapted to the cybersecurity domain. The proposed cybersecurity countermeasure taxonomy can be applied without adhering to a specific risk management methodology, model or framework, although it is compatible with most existing methodologies, models and frameworks. The results include a taxonomy of 229 countermeasures, categorized into 19 second-level and five first-level taxa. This taxonomy was applied in an access management case study implemented at a banking organization. The steps described by Yin were used as a guide to drive the case study. The organization previously applied 12 countermeasures. As a result of the application of CRTT, however, six additional countermeasures were identified. Therefore, the organization considered that CRTT was a valuable resource to help organizations select and implement appropriate countermeasures based on their specific cybersecurity needs and decided to continue to apply the CRTT as part of a pilot program.

Keywords
Countermeasure taxonomiesCybersecurityExperimentationProposalRisk treatmentValidatioValidation

Quality index

Bibliometric impact. Analysis of the contribution and dissemination channel

The work has been published in the journal Cluster Computing-The Journal Of Networks Software Tools And Applications due to its progression and the good impact it has achieved in recent years, according to the agency WoS (JCR), it has become a reference in its field. In the year of publication of the work, 2025, it was in position 78/250, thus managing to position itself as a Q1 (Primer Cuartil), in the category Computer Science, Information Systems.

Impact and social visibility

From the perspective of influence or social adoption, and based on metrics associated with mentions and interactions provided by agencies specializing in calculating the so-called "Alternative or Social Metrics," we can highlight as of 2025-05-02:

  • The use of this contribution in bookmarks, code forks, additions to favorite lists for recurrent reading, as well as general views, indicates that someone is using the publication as a basis for their current work. This may be a notable indicator of future more formal and academic citations. This claim is supported by the result of the "Capture" indicator, which yields a total of: 3 (PlumX).
Leadership analysis of institutional authors

There is a significant leadership presence as some of the institution’s authors appear as the first or last signer, detailed as follows: First Author (SANCHEZ GARCIA, ISAAC DANIEL) and Last Author (CALVO-MANZANO VILLALON, JOSE ANTONIO).

the author responsible for correspondence tasks has been SANCHEZ GARCIA, ISAAC DANIEL.