Explore Westonci.ca, the premier Q&A site that helps you find precise answers to your questions, no matter the topic. Get the answers you need quickly and accurately from a dedicated community of experts on our Q&A platform. Explore comprehensive solutions to your questions from a wide range of professionals on our user-friendly platform.
Sagot :
Answer:
- Threat analysis
- Consequence analysis
- Event and Fault tree analyses
- Vulnerability analysis
Explanation:
Threat Analysis
Involves the identification of areas of the system in question that are vulnerable to risk and then identifying what those risks are.
Consequence Analysis
With consequence analysis, the possible effects of the risks identified will be analyzed to see how much damage they can cause.
Event and Fault tree analyses
Here a tree is used to show all of the possible effects of a risky activity failing. It is used to find out the cause of the worst case scenario.
Vulnerability analysis
As the term implies, vulnerability analysis is done to see which parts of a system are at risk and how vulnerable they are to this risk and then ranking these vulnerabilities so that they can be prioritized.
Thanks for using our platform. We're always here to provide accurate and up-to-date answers to all your queries. Your visit means a lot to us. Don't hesitate to return for more reliable answers to any questions you may have. We're here to help at Westonci.ca. Keep visiting for the best answers to your questions.