Examples of techniques in support of the risk assessment process (informative)
Unterkapitel anzeigen Unterkapitel ausblenden Information security risk criteria
Unterkapitel anzeigen Unterkapitel ausblenden Criteria related to risk assessment
Unterkapitel anzeigen Unterkapitel ausblenden Risk assessment general considerations
Qualitative approach
Unterkapitel anzeigen Unterkapitel ausblenden Consequences scale
Likelihood scale
Level of risk
Quantitative approach
Unterkapitel anzeigen Unterkapitel ausblenden Risk acceptance criteria
Practical techniques
Unterkapitel anzeigen Unterkapitel ausblenden Information security risk components
Assets
Risk sources and desired end state
Event-based approach
Unterkapitel anzeigen Unterkapitel ausblenden Ecosystem
Strategic scenarios
Asset-based approach
Unterkapitel anzeigen Unterkapitel ausblenden Examples of threats
Examples of vulnerabilities
Methods for assessment of technical vulnerabilities
Operational scenarios
Examples of scenarios applicable in both approaches
Monitoring risk-related events