Table of Contents Table of Contents
Previous Page  10 / 177 Next Page
Information
Show Menu
Previous Page 10 / 177 Next Page
Page Background

8

FFI-RAPPORT 16/00707

List of Tables

Table 4.1

Terms related to risk and vulnerability analysis

p.21-22

Table 4.2

Terms related to computer security

p.22-23

Table 4.3

Terms related to the scenario-based approach

p.23

Table 5.1

Geographical zones

p.26

Table 5.2

The classifications of sensitive information

p.28

Table 5.3

The user classes and corresponding assets used in the

scenario development

p.29-30

Table 5.4

The location and layout of the storage facilities used in the

scenario development

p.31

Table 5.5

The safety requirements of the storage facilities used in the

scenario development

p.36

Table 5.6

The security regime of the storage facilities used in the

scenario development

p.37

Table 5.7

The security regime during the production and transportation

phase

p.39

Table 6.1

Example of a morphological matrix

p.51

Table 6.2

Matrix for analysis of scenario classes of unintentional events

p.52

Table 6.3

Matrix for analysis of scenario classes of intentional acts

p.56