Results (
Thai) 1:
[Copy]Copied!
a difficult task to say the least, while the asset-driven approach allows the assessor togo through the assets, one by one, defining what could threaten the Confidentiality,Integrity, and/or Availability of that asset. For that reason, this approach has beenchosen for this study.In this approach, we list, for each asset, the various threats to its Confidentiality,Integrity, and/or Availability. Then we assign each threat a High, Medium, or LowImpact rating and a High, Medium, or Low Likelihood. This is a process that requiresexperience, and is, by definition, at least partially subjective: what is a “high medium”rating to one assessor may be a “low high” to another.In order to improve clarity, the threats identified are listed in Appendix 6, theThreat Table.
Being translated, please wait..
