OCTAVESM
Router Firewall
Security
Switch
Access Matrix
User Access
Matrix
Case Study : System XYZ (Key
Component and Vulnerabilities)
Vulnerability
Component Tools Scan/Review
Summary
Server 3 High
Y
2 Medium
Router Improve-UR- Y 1 High
Network
Switch Y 1 High
Firewall Y 1 High
Security Access 5 High
Y
Matrix Review
User Access Matrix Y 5 High
Workstation Improve-UR- 2 high
Y
Network
PC User 1 Vulnerabilies-R- Y 2 Medium
PC User 2 Found Y 2 Medium
Case Study : Sytem XYZ ( Vulnerability
Security Level)
Case Study : Sytem XYZ (Impact &
Probability)
Case Actor Motive Outcome Impact Probability
1 Inside Accidental Modification High Medium
Inside Deliberate Disclosure High High
2
Outside Deliberate Disclosure High Medium
Disclosure High Medium
3 Outside Deliberate
Modification High Medium
Case Study : Sytem XYZ (Evalutaion)