Zusammenfassung der Ressource
Risk Assessment
- System Characterization
- System Related
- hardware & software
- system interface
- data & information
- people
- system mission
- Information Gathering Technique
- document review
- questionaire
- on-site interview
- scanning tools
- Threat Identification
- Threat Source Identification
- hacker/cracker
- computer criminal
- terrorist
- Business espionage
- insider
- Motivation and Threat Actions
- ego
- rebellion
- challenge
- monetary
- revenge
- Vulnerability Identification
- Vulnerability Sources
- System Security Testing
- Development of Security Requirements Checklist
- Control Analysis
- Methods
- technical
- IDS
- Encryption
- non-technical
- security policy
- management policy
- procedures
- Categories
- preventive
- reactive
- Technique
- Likelihood Determination
- Impact Analysis
- Risk Determination
- Risk Level Matrix
- likelihood rating
- impact rating
- Description of Risk Level
- Control Recommendation
- Result Documentation