/Type /StructElem /Pg 43 0 R /Pg 45 0 R >> /P 455 0 R <<
492 0 obj /Type /StructElem << 279 0 obj /K [ 47 ] /S /P >> /Type /StructElem << >> 724 0 obj /K [ 37 ] /Type /StructElem /P 712 0 R
/K [ 3 ] /Pg 43 0 R
endobj /Pg 32 0 R
636 0 obj /P 712 0 R << Microsoft Risk Management Approach ISO Standard for Sec. endobj << /Type /StructElem
Cloud reporting helps admins address capacity issues and reduce outages. <<
712 0 obj /Type /StructElem /Pg 43 0 R << 100 0 obj
/Pg 43 0 R >> >> /Type /StructElem
>> /Pg 43 0 R /S /P << /K [ 35 ]
/S /P /S /P
/S /LBody << >> endobj endobj 89 0 obj /P 188 0 R >> /Pg 39 0 R endobj 715 0 obj /P 59 0 R
endobj /P 388 0 R 323 0 obj
<< /P 583 0 R >>
/P 59 0 R /Type /StructElem /K [ 527 0 R ] /S /P /Pg 43 0 R <<
/Type /StructElem /K [ 13 ] /Pg 39 0 R << /Type /StructElem /K [ 33 ] <<
>> /Type /StructElem
/P 289 0 R /P 561 0 R
>> <<
/Type /StructElem >> /Type /StructElem
endobj 325 0 obj
/K [ 396 0 R ] /Type /StructElem /K [ 146 ]
/ParentTreeNextKey 7 290 0 obj /S /LBody /S /TD endobj /K 78 << /P 712 0 R
/K [ 320 0 R ] 150 0 obj 691 0 obj /K [ 49 ] 305 0 obj endobj endobj
215 0 obj
<< /K [ 102 ] /Type /StructElem /Type /StructElem
<< 373 0 obj >> endobj
/Pg 43 0 R
>> /F3 12 0 R
>>
endobj This phase has four processes.
>>
/Pg 3 0 R /P 289 0 R endobj << /Type /StructElem << /S /TD /S /P /Pg 32 0 R The OCTAVE risk assessment method focuses on speed, since for most businesses, time is money. endobj /Type /StructElem
endobj /Pg 39 0 R /S /TR
<< endobj /Pg 39 0 R /Type /StructElem endobj
/S /TD /K [ 43 ]
/K [ 114 ] /Pg 39 0 R /S /H2
<< /K [ 151 ] /Type /StructElem <<
<<
364 0 obj >> /S /Span << >> >> 246 0 obj >>
>> >> /P 371 0 R /Type /StructElem
/P 125 0 R >> << << /Type /StructElem << >>
324 0 R 326 0 R 328 0 R 330 0 R 331 0 R 334 0 R 336 0 R 338 0 R 340 0 R 342 0 R 344 0 R
/P 59 0 R << endobj /P 490 0 R
/Type /StructElem >> endobj endobj
endobj >> /Type /StructElem endobj
>>
<< 333 0 obj 471 0 obj /P 59 0 R
endobj >> << 692 0 R 693 0 R 694 0 R 695 0 R 696 0 R 697 0 R 698 0 R 699 0 R 700 0 R 701 0 R ]
/K [ 20 ] 634 0 obj
/K [ 31 ] /K [ 9 ] /Type /StructElem /K [ 654 0 R ] /P 99 0 R /Type /StructElem
244 0 obj /Pg 43 0 R 138 0 obj /Pg 45 0 R /K [ 42 ] >> >> /Type /StructElem << << >> 677 0 obj /Pg 43 0 R /Type /StructElem >> /P 647 0 R /P 59 0 R /P 59 0 R >> endobj
<< >>
<< endobj endobj << <<
endobj
/S /P >>
endobj endobj The framework defines a methodology to help organizations minimize exposure to likely threats, determine the likely consequences of an attack and deal with attacks that succeed. 117 0 obj 644 0 obj /S /P >> << /P 444 0 R /Type /StructElem << Basic information to identify the product, Details about the type of initiator of the product, Specify the phases this method supports and a short description, Date of the first edition, date and number of actual version, List the available languages that the tool supports, Defines the most appropriate type of organisations the product aims at, Information concerning the spread of this tool, Specify the licensing and certification schemes available for this method, Specify the level of skills needed to use and maintain the solution, There is a given compliance of the product with international regulations, There is a compliance with a national or international standard.
/Pg 39 0 R >>
>>