2015 | OriginalPaper | Buchkapitel
Risk Identification
verfasst von : Atle Refsdal, Bjørnar Solhaug, Ketil Stølen
Erschienen in: Cyber-Risk Management
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Risk identification involves determining what could happen to cause potential harm to assets, which includes gaining insight into how, where and why such cyberincidents may occur. This chapter starts by giving an overview of risk identification techniques, before moving on to demonstrate how the risk identification process described in Chap.
5
can be instantiated. Two different identification approaches are used, one aimed at malicious cyber-risk and the other at non-malicious cyber-risk. 1.10 Risk Treatment 5. In both cases we provide examples of threat sources, threats, vulnerabilities and incidents for the target described in Chap.
6
, and show how these, as well as the relations between them, are documented.