Team LiB   Previous Section   Next Section

Chapter 3. Introduction to the OCTAVE Method

This chapter will introduce you to the basic structure of the OCTAVE Method, providing the foundation for a more detailed examination of the method in the following chapters. We also illustrate how the method is consistent with the general information security risk evaluation approach previously described.

Section

3.1 Overview of the OCTAVE Method

3.2 Mapping Attributes and Outputs to the OCTAVE Method

3.3 Introduction to the Sample Scenario

    Team LiB   Previous Section   Next Section