Welcome to our new site version. Your web page bookmarks may have changed, please search for pages by title to update them. Having problems ? Please try clearing your web browser cache and hard-reloading your web page first before contacting our webmaster.

Security Vulnerability Analysis

[document] Submitted on 17 January, 2019 - 14:22
Keywords analysis security analysis vulnerability analysis
Standards groups

The Security Vulnerability Analysis Shall include:

a. A preface with narrative description of the system. Information concerning each form of external
overt or covert method of attack against the system considered during system development.

b. Threat models in Threat Logic Three format showing showing their transition from preliminary to
initial threat logic trees and hence into summary threat matrix form.

c. Rationale used for threat rejection in developing the initial threat logic Tree.

d. An Evaluation of the conditional probabilities for achieving each adversary mission objective.

e. An assessment of security vulnerabilities related to inform security, personnel security, industrial
security, operations security, communications security, physical security, computer security, product
security and tempest.

Document identifier
Date published
Language of Attachment(s)
Document type
Data Item Description (DID)
Defines standard
Replaced/Superseded by document(s)
Cancelled by
Amended by
File MIME type Size (KB) Language Download
Security Vulnerability Analysis.pdf application/pdf   141.15 KB English DOWNLOAD!
File attachments
Cover images

The Security Vulnerability Analysis provides the result of the contractor's efforts to quantitatively and qualitatively define system security functional requirements and residual clandestine vulnerabilities. It will be classified no lower than secret restricted Data, as applicable. This analysis contributes to the security vulnerability analysis.

Visit also