|
Dimensions | Associated activities | Degree of grey relation | Degree of grey relation (dimension) | Risk ranking |
|
A1: Identification and access management | A1.1: Loss of secret keys | 0.613095 | 0.619312 | 3 |
A1.2: Cryptanalysis of a ciphered signal | 0.654762 |
A1.3: Secret password divulged to any other user | 0.708333 |
A1.4: Intentional access to network services, for example, proxy servers | 0.560185 |
A1.5: Spoofing: impersonation of a legitimate user | 0.560185 |
|
A2: Device and application registration | A2.1: Facility problems | 0.526515 | 0.588648 | 2 |
A2.2: Failure of encryption equipment | 0.532407 |
A2.3: Unauthorized use of secure equipment | 0.631614 |
A2.4: Ineffective infrastructure investment | 0.597944 |
A2.5: Failure of application server | 0.654762 |
|
A3: Infrastructure management | A3.1: Cabling problems | 0.631614 | 0.712743 | 4 |
A3.2: Failure of radio platform transmission | 0.710317 |
A3.3: Failure of cipher audio (telephone) and video | 0.738095 |
A3.4: Failure of sensor networks | 0.708333 |
A3.5: Failure of potential of energy | 0.833333 |
A3.6: Unauthorized readout of data stored on a remote LAN | 0.654762 |
|
A4: Data governance | A4.1: Failure of interpretation and analysis of data | 0.498737 | 0.50965 | 1 |
A4.2: Failure of audit review of implemented policies and information security | 0.528499 |
A4.3: Failure to maximize new business value | 0.526515 |
A4.4: Failure of real-time demand forecasts | 0.484848 |
|