DO BASED ON PRODUCTION 1- Factory Block: Production 1 + Raw Material Store
Read under “Security Questions” for more informations and powerpoint slides (Topic 1,2,4) for better knowledge.
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion
Risk Analysis Matrix
Potential Undesirable Events | Threat Rating | Vulnerable Rating | Impact Rating | Overall Risk Rating | Probability Analysis | Risk Acceptable? |
Impact Rating
1 Loss or Injury to Human Life | 2 Loss of Top Secret or Secret Data | 3 Loss of Confidential Data | 4 Loss of Sensitive, Unclassified Data | 5 Impaired or Halted Operations, Program or Project | 6 Damage to or Loss of Costly Property | OVERALL IMPACT LEVEL |
Threat Rating
Intent | Capability | History | Threat Level |
Vulnerable Rating
Vulnerable Through One Weakness? | Difficult to Exploit | Multiple Layers of Countermeasures | Vulnerability Level |
Overall Rating
Threat Level | Vulnerability level | Impact level | Risk Level |
Conclusion