Team LiB   Previous Section   Next Section

List of Tables

Table 2-1 Information Security Principles, Attributes, and Outputs

Table 2-2 Mapping OCTAVE Principles to Attributes

Table 2-3 Phase 1 Outputs

Table 2-4 Phase 2 Outputs

Table 2-5 Phase 3 Outputs

Table 3-1 Mapping of Attributes to the OCTAVE Method

Table 3-2 Mapping of Outputs to the OCTAVE Method

Table 4-1 OCTAVE Preparation Activities

Table 4-2 Participants in the OCTAVE Method

Table 4-3 Analysis Team Members

Table 4-4 Senior Managers

Table 4-5 Operational Areas and Operational Area Managers

Table 4-6 General and Information Technology Staff Members

Table 5-1 Processes 1 to 3 Activities

Table 5-2 Considerations for Asset Categories

Table 5-3 Description of Senior Management Assets

Table 5-4 Threat Sources

Table 5-5 Threat Outcomes

Table 6-1 Preparation Activities for Process 4

Table 6-2 Process 4 Activities

Table 6-3 Threat Sources

Table 6-4 Relationships Among Security Requirements and Outcomes

Table 7-1 Process 5 Activities

Table 7-2 Key Classes of Components

Table 8-1 Preparation Activities for Process 6

Table 8-2 Process 6 Activities

Table 9-1 Process 7 Activities

Table 10-1 Preparation Activities for Process 8A

Table 10-2 Process 8A Activities

Table 10-3 Key Questions for Strategic Practice Areas

Table 11-1 Preparation Activity for Process 8B

Table 11-2 Process 8B Activities

Table 11-3 Key Elements of Presentation to Senior Managers

Table 14-1 Risk Identification Tasks

Table 14-2 Risk Analysis Tasks

Table 14-3 Risk Planning Tasks

Table 14-4 Risk Implementation Task

Table 14-5 Tasks for Monitoring Risks

Table 14-6 Tasks for Controlling Risks

Table A-1 Protection Strategy for MedSite

Table A-2 Action List for MedSite

Table A-3 MedSite's Critical Assets

Table A-4 Security Requirements for Paper Medical Records

Table A-5 Areas of Concern for Paper Medical Records

Table A-6 Types of Impact and Impact Values for Paper Medical Records

Table A-7 Security Requirements for Personal Computers

Table A-8 Types of Impact and Impact Values for Personal Computers

Table A-9 Security Requirements for PIDS

Table A-10 Areas of Concern for PIDS

Table A-11 Types of Impact and Impact Values for PIDS

Table A-12 Security Requirements for ABC Systems

Table A-13 Types of Impact and Impact Values for ABC Systems

Table A-14 Security Requirements for ECDS

Table A-15 Areas of Concern for ECDS

Table A-16 Types of Impact and Impact Values for ECDS

Table A-17 Systems of Interest and Key Classes of Components

Table A-18 Infrastructure Components Examined

Table A-19 Technology Vulnerability Evaluation Results

Table A-20 Severity Levels

Table A-21 Phase 2 Recommendations

Table A-22 Evaluation Criteria

Table A-23 Assets Grouped by Organizational Level

Table A-24 Security Awareness and Training

Table A-25 Security Strategy

Table A-26 Security Management

Table A-27 Security Policies and Regulations

Table A-28 Collaborative Security Management

Table A-29 Contingency Planning/Disaster Recovery

Table A-30 Physical Security Plans and Procedures

Table A-31 Physical Access Control

Table A-32 Monitoring and Auditing Physical Security

Table A-33 System and Network Management

Table A-34 System Administration Tools

Table A-35 Monitoring and Auditing IT Security

Table A-36 Authentication and Authorization

Table A-37 Vulnerability Management

Table A-38 Encryption

Table A-39 Security Architecture and Design

Table A-40 Incident Management

Table A-41 General Staff Practices

    Team LiB   Previous Section   Next Section