D17 Risk id methodology
|
IT risks catalogue
|
D21 Relevant threats
|
IT risks catalogue
|
D22 Relevant vulnerabilities
|
IT risks catalogue
|
D23 Relevant impacts
|
IT risks catalogue
|
D24 Values for assets
|
IT risks catalogue
|
D26 Likelihood data
|
IT risks catalogue
|
D27 Disregarded threats just.
|
IT risks catalogue
|