|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
Identify
the possible compromises (threats)
|
|
|
¨ |
Identify
the scope of the analysis
|
|
|
|
– |
What
is “outside the system”
|
|
|
|
– |
What
assumptions are made about the environment in
|
|
|
which
the system is operated?
|
|
|
¨ |
For
each, scope out the perpetrators, the
|
|
|
likelihood,
and the expense if this threat becomes
|
|
real.
|
|
|
¨ |
Based
on this, perform a prioritization of risks so
|
|
|
that
limited development $$$ maximize
|
|
|
cost/benefit.
|
|