Chapter 3. Introduction to the OCTAVE Method

This chapter will introduce you to the basic structure of the OCTAVE Method, providing the foundation for a more detailed examination of the method in the following chapters. We also illustrate how the method is consistent with the general information security risk evaluation approach previously described.

Section

3.1 Overview of the OCTAVE Method

3.2 Mapping Attributes and Outputs to the OCTAVE Method

3.3 Introduction to the Sample Scenario

Get Managing Information Security Risks: The OCTAVESM Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.