Require: SGT = Security-golden-triangle} |
Require:ββ{Experts} |
β1: Cube = [Business, Logical, Physical] {Security Cube} |
β2: Business = [Human] |
β3: Logical = [Foreign, Country, Organization, Personal, Organizational, Platform, Application, Strategy, Protocol, |
ββCommunication, Design] |
β4: Physical = [Media, Storage, Where, Hardware Component] |
β5: forββeach Cubeββdo |
β6: βforββeach ββdo |
β7: ββA = AssetIdentification : domains, : sections} |
β8: βendββfor |
β9: endββfor |
β10: = ThreatIdentification() {Threat Identification |
β11: Evaluation(, SGT) {CIA Triad Evaluation} |
β12: for each ββdo |
β13: β = VulnerabilityIdentification() {Vulnerability Identification |
β14: endββfor |
β15: = RiskIdentification() {Risk Identification |
β16: forββeachββββdo |
β17: β = AssetValue() {Asset value} |
β18: endββfor |
β19: forββeachββββdo |
β20: β = VulnerabilityEffect() {Vulnerability Effect} |
β21: endββfor |
β22: forββeachββββdo |
β23: β = ThreatEffect() {Threat Effect} |
β24: endββfor |
β25: forββeachββββdo |
β26: βFRA = Fuzzification() {related asset} |
β27: βFRV = Fuzzification() {related vulnerability} |
β28: βFRT = Fuzzification() {related threat} |
β29: β = defuzzification(FRA, FRV, FRT) |
β30: endββfor |
β31: ReturnββSRE = Sort(RE) |