1999
DOI: 10.21236/ada367718
|View full text |Cite
|
Sign up to set email alerts
|

Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Framework, Version 1.0

Abstract: The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
67
0
13

Year Published

2006
2006
2021
2021

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 88 publications
(80 citation statements)
references
References 0 publications
0
67
0
13
Order By: Relevance
“…The OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a qualitative risk assessment approach proposed by CERT-SEI (Alberts et al 1999) to manage information security risks, helping organizations to map threats and protect organization assets. One characteristic that makes OCTAVE unique is that it is based on operational risk and security practices that are identified by the organization, not relying on outside requirements.…”
Section: Security Assessment Methodologiesmentioning
confidence: 99%
“…The OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a qualitative risk assessment approach proposed by CERT-SEI (Alberts et al 1999) to manage information security risks, helping organizations to map threats and protect organization assets. One characteristic that makes OCTAVE unique is that it is based on operational risk and security practices that are identified by the organization, not relying on outside requirements.…”
Section: Security Assessment Methodologiesmentioning
confidence: 99%
“…Fuel shortage crisis is one of the major risk, to manage this risk, several international standards can be used as a guideline, some of them are, the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE SM ) that has three phases, they are build organisation security requirements, identify infrastructure vulnerabilities, and determine security risk management strategy [9]. One more standard is the American National Institute of Standards & Technology (NIST) issued the Federal Information Processing Standards Publications (FIPS PUBS) [10].…”
Section: Conducting a Counterespionage Risk Assessmentmentioning
confidence: 99%
“…The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) method [10] is a framework for identifying and managing information security risks developed by Computer Emergency Response Team. It also is a suite of tools, techniques, and methods for risk-based information security strategic assessment and planning.…”
Section: Related Workmentioning
confidence: 99%