
Cyber Security
Cards can be used to operationalise the concerns and controls associated with deliberate or accidental data challenges. These may include::
- Denial of Service
- Data deleted
- Data extracted/exported
- Data manipulated
With a variety of negative effects (Consequences):




Created by a range of causes (Threats):




Which are prevented or mitigated by a portfolio of Technical & Organisational controls (Barriers):
- Protection
- Detection
- Recovery
Cards are developed from industry best practice including HSE OG086 and NIST SP800-30:

CHASE
Bowties can be used to identify, evaluate & manage potential cyber security threats.

This is summarised in our Computer Hazard And Security Evaluation (CHASE™) methodology video below:
For more information please contact us.