Exchange Data
Asse1
Assess and evaluate IT risks ICS
Description
Data
D21 Relevant threats
D22 Relevant vulnerabilities
D23 Relevant impacts
D24 Values for assets
D26 Likelihood data
D27 Disregarded threats just.
D17 Risk id methodology