Page History
...
DSSA -- Risk assessment -- threat event tree - v5.html
DSSA - Threat-event Architecture v1.mm
DSSA - Threat-event Architecture v1.pdf
Tables
DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v2.xlsx
Results from the 19-Jan teleconference
Mind-map
DSSA - Risk assessment -- threat event tree - v6.mm
DSSA - Risk assessment -- threat event tree - v6.mm.html
Tables
DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v3.xlsx
Results from the 26-Jan teleconference
Mind-map
DSSA - Risk assessment -- threat event tree - v7.mm
DSSA - Risk assessment -- threat event tree - v7.mm.html
Tables
DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v4.xlsx
Results from the 9-Feb teleconference
Mind-map
DSSA - Risk assessment -- threat event tree - v8.pdf
DSSA - Risk assessment -- threat event tree - v8.mm
DSSA - Risk assessment -- threat event tree - v8.mm.html
Tables
DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v5.xlsx
Results from the 16-Feb teleconference
Tables
(note -- the following table may be at end-of-life -- the group had a long discussion this week and we are considering revising our analysis approach)
DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v6.xlsx
(note -- the following table is the first draft of our new approach)
DSSA -- Table E-5 - Threat Events v1.xlsx
Results from the 23-Feb teleconference