Ch.I Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities Ch.II An Attack Graph Based Approach for Threat Identification of an Enterprise Network Ch.III Insider Threat Prevention, Detection and Mitigation Ch.IV An Autocorrelation Methodology for the Assessment of Security Assurance Ch.V Security Implications for Management from the Onset of Informationā¦