Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Tugas Manejemen Resiko Teknologi

Informasi
Adversarial and Non-Adversarial Risk Table

Disusun Oleh
Alvonsius Ruhiyat 111401001
Guntur Aldinosa 111401008
Frensiska 111401017
Dining Ayu Rinjani 111401022
Monang Bahana 1116131001

Fakultas Teknik

Sistem Informasi

Universitas Widyatama

Tahun Ajaran 2016


Threat Source Likehoo Vulnerabilit Likelihoo
Characteristics ies and Severity d Overall
d of Level of
Threat Threat Relevanc Predisposin and Initiated Likelihoo
Impact
attack g Pervasiven Attack d Risk
Event Source Capabili Targetti e
Intent Intiatio Conditions ess Succeeds
ty ng
n
Leakag Accidental Modera Possible Moderat Low High Moderate Modera Modera High
e te e te te

Theft Adversarial High Modera Moderat Anticipat Modera Low HIgh Modera Modera High High
happen te e ed te te te
s
throug
h the
window
Electric environmen Very Very High Anticipat HIgh Low High Low Modera High HIgh
al short tal HIgh Low ed te
circuit

Adversarial Risk Table


Non Adversarial Risk

Vulnerabiliti Likelihood
Threat Threat Range Of Likehood es and Severity and Initiated Overall Level of
Relevanc Predisposing Attack Likelihood Impact
Event Source Effects of attack Pervasivene Risk
e Conditions ss Succeeds
Intiation
Earthqua Environme Very
Very Very
ke ntal High Possible High Very High Very High High Very High
High HIgh
Flooding
from the
river
Environme Moderat
Cidurian
ntal e Possible Low Moderate HIgh Low Moderate High High
around
of
Widyata
ma
Environme
Fire High Possible High Moderate Very High Moderate High High High
ntal

You might also like