UrRisk04_Example - SRA 311 UrRisk#4 Table 2010 UrRISK04 2...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
SRA 311 2010 UrRisk #4 Table _____
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
UrRISK04 2 Table of Contents Introduction ................................................................................................................................. 3 Purpose ...................................................................................................................................... 3 I. Scope of this risk Assessment ................................................................................................. 3 II. Risk Assessment Approach .................................................................................................... 4 III. System Characterization ........................................................................................................ 5 IV. Threat Statement ................................................................................................................... 6 V. Risk Assessment Results ....................................................................................................... 7 Observations ............................................................................................................................ 7 Identification and recommendation of mitigating controls ........................................................ 7 Likelihood / Impact Evaluation ................................................................................................. 8 VI. Summary ............................................................................................................................... 8 References ............................................................................................................................... 12 Attachment 1 Fact Sheet ......................................................................................................... 9 Attachment 2 Threat Pairs ..................................................................................................... 10 Attachment 3 Threat Pairs ..................................................................................................... 11
Image of page 2