

8
FFI-RAPPORT 16/00707
List of Tables
Table 4.1
Terms related to risk and vulnerability analysis
p.21-22
Table 4.2
Terms related to computer security
p.22-23
Table 4.3
Terms related to the scenario-based approach
p.23
Table 5.1
Geographical zones
p.26
Table 5.2
The classifications of sensitive information
p.28
Table 5.3
The user classes and corresponding assets used in the
scenario development
p.29-30
Table 5.4
The location and layout of the storage facilities used in the
scenario development
p.31
Table 5.5
The safety requirements of the storage facilities used in the
scenario development
p.36
Table 5.6
The security regime of the storage facilities used in the
scenario development
p.37
Table 5.7
The security regime during the production and transportation
phase
p.39
Table 6.1
Example of a morphological matrix
p.51
Table 6.2
Matrix for analysis of scenario classes of unintentional events
p.52
Table 6.3
Matrix for analysis of scenario classes of intentional acts
p.56