Cards can be used to operationalise the concerns and controls associated with deliberate or accidental data challenges. These may include::
- Denial of Service
- Data deleted
- Data extracted/exported
- Data manipulated
With a variety of negative effects (Consequences):
Created by a range of causes (Threats):
Which are prevented or mitigated by a portfolio of Technical & Organisational controls (Barriers):
Bowties can be used to identify, evaluate & manage potential cyber security threats.
This is summarised in our Computer Hazard And Security Evaluation (CHASE™) methodology video below:
For more information please contact us.