Data Integrity

Cyber Security

Cards can be used to operationalise the concerns and controls associated with deliberate or accidental data challenges. These may include::

  • Denial of Service
  • Data deleted
  • Data extracted/exported
  • Data manipulated

With a variety of negative effects (Consequences):

Created by a range of causes (Threats):

Which are prevented or mitigated by a portfolio of Technical & Organisational controls (Barriers):

  • Protection
  • Detection
  • Recovery

Cards are developed from industry best practice including HSE OG086 and NIST SP800-30:

Images © Process Safety Integrity

CHASE

Bowties can be used to identify, evaluate & manage potential cyber security threats.

Cyber Security Bowties

This is summarised in our Computer Hazard And Security Evaluation (CHASE™) methodology video below:

For more information please contact us.