List of Tables
Table 2-1 Information Security Principles, Attributes, and Outputs
Table 2-2 Mapping OCTAVE Principles to Attributes
Table 2-3 Phase 1 Outputs
Table 2-4 Phase 2 Outputs
Table 2-5 Phase 3 Outputs
Table 3-1 Mapping of Attributes to the OCTAVE Method
Table 3-2 Mapping of Outputs to the OCTAVE Method
Table 4-1 OCTAVE Preparation Activities
Table 4-2 Participants in the OCTAVE Method
Table 4-3 Analysis Team Members
Table 4-4 Senior Managers
Table 4-5 Operational Areas and Operational Area Managers
Table 4-6 General and Information Technology Staff Members
Table 5-1 Processes 1 to 3 Activities
Table 5-2 Considerations for Asset Categories
Table 5-3 Description of Senior Management Assets
Table 5-4 Threat Sources
Table 5-5 Threat Outcomes
Table 6-1 Preparation ...
Get Managing Information Security Risks: The OCTAVESM Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.