2007
DOI: 10.21236/ada470450
|View full text |Cite
|
Sign up to set email alerts
|

Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process

Abstract: ix .4 Obtaining Feedback and Direction 30Appendix A OCTAVE Allegro Method Guidance v1.0 31Step 1 -Establish Risk Measurement Criteria 32Step 2 -Develop an Information Asset Profile 34Step 3 -Identify Information Asset Containers 40Step 4 -Identify Areas of Concern 46Step 5 -Identify Threat Scenarios 48Step 6 -Identify Risks 53Step 7 -Analyze Risks 55Step 8 Tables Table 1: OCTAVE Timeline 2 The development, piloting, and codification of the OCTAVE Allegro method would not have been possible without the g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
206
0
21

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 228 publications
(227 citation statements)
references
References 1 publication
0
206
0
21
Order By: Relevance
“…Using system scanning tools would improve identifying technical issues in the SRA, but tool-based vulnerability identification is time-consuming and momentum is lost (Caralli et al, 2007).…”
Section: Vulnerability Results Accuracy At the Ara And Sramentioning
confidence: 99%
See 1 more Smart Citation
“…Using system scanning tools would improve identifying technical issues in the SRA, but tool-based vulnerability identification is time-consuming and momentum is lost (Caralli et al, 2007).…”
Section: Vulnerability Results Accuracy At the Ara And Sramentioning
confidence: 99%
“…In the approaches of InnerhoferOberperfler and Breu (Innerhofer-Oberperfler and Breu, 2006), Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) (Alberts et al, 2003), OCTAVE Allegro (Caralli et al, 2007), conditions or situations that can threaten an organization's information assets" (Caralli et al, 2007): 18) can be used for vulnerability identification. In NIST SP 800-30 (Stoneburner et al, 2002), vulnerability knowledge bases, system security testing and a security requirements' checklist are all used for vulnerability identification.…”
Section: Related Workmentioning
confidence: 99%
“…Several RA methodologies and tools have been developed; some focus on the assets (CRAMM, 2010;Caralli et al, 2007; http://www.ar-tools.com/en/tools/pilar/) and others on the business processes (de Haes and Debreceny, 2013;Simonsson et al, 2007). Other methodologies focus on the risk derived from CI dependencies (Stergiopoulos et al, 2016a;Kotzanikolaou et al, 2013aKotzanikolaou et al, , 2013bKotzanikolaou et al, , 2013cAlpcan and Bambos, 2009) and their potential cascading effects.…”
Section: Motivationmentioning
confidence: 99%
“…Asset-based methodologies like MAGERIT, CORAS and MEHARI involve their users in the assessment (Amutio et al, 2014;CLUSIF, 2010;CORAS, 2010). CRAMM, OCTAVE and RiskSafe require extensive standardised documentation throughout RA to ensure traceability of results (CRAMM, 2010;Platinum Squared, 2014;Caralli et al, 2007). In addition, each of these RA methods demands a knowledgeable team (analysts, system administrators, users, etc.)…”
Section: Literature Reviewmentioning
confidence: 99%
“…Most academic approaches suggest a graphical notation, starting from the seminal work on Anti-Goals [1] to [2] and more recently [3]. Industry opts for tabular models like OCTAVE [4], ISO 27005 and NIST 800-30. Microsoft STRIDE [5] is the exception on the industry side and SREP [6] is the exception on the academic side.…”
Section: Introductionmentioning
confidence: 99%