"A risk assessment of the Piql Services" by FFI

List of Tables

Table 4.1

Terms related to risk and vulnerability analysis

p.21-22

Table 4.2

Terms related to computer security

p.22-23

Table 4.3

Terms related to the scenario-based approach

p.23

Table 5.1

Geographical zones

p.26

Table 5.2

The classifications of sensitive information

p.28

Table 5.3

The user classes and corresponding assets used in the scenario development The location and layout of the storage facilities used in the scenario development The safety requirements of the storage facilities used in the scenario development The security regime of the storage facilities used in the scenario development The security regime during the production and transportation phase

p.29-30

Table 5.4

p.31

Table 5.5

p.36

Table 5.6

p.37

Table 5.7

p.39

Table 6.1

Example of a morphological matrix

p.51

Table 6.2

Matrix for analysis of scenario classes of unintentional events

p.52

Table 6.3

Matrix for analysis of scenario classes of intentional acts

p.56

8

FFI-RAPPORT 16/00707

Made with FlippingBook Online newsletter