Crypto attacks . | Category . | Item → corresponding impact level → corresponding digit . |
---|---|---|
. | ||
Attack 1 . | Business continuity disruption timeframe . | Up to 1 week → ‘Low’ → 1 . |
Encrypted information critical to business . | Not critical → ‘Low’ → 1 . | |
Information loss . | Some loss acceptable with incremental backups → ‘Low’ → 1 . | |
Affected devices . | One desktop and shares on a server → ‘Low’ → 1 . | |
Recovery time . | Up to 2 weeks → ‘Low’ → 1 . | |
Maximum value | 1 | |
Attack impact level | Low | |
Attack 9 | Business continuity disruption timeframe | Up to 1 week → ‘Low’ → 1 |
Encrypted information critical to business | Critical to high priority functions → ‘High’ → 3 | |
Information loss | Some loss acceptable with incremental backups → ‘Low’ → 1 | |
Affected devices | Several desktops and shares on servers → ‘Low’ → 1 | |
Recovery time | Up to 1 month → ‘Medium’ → 2 | |
Maximum value | 3 | |
Attack impact level | High |
Crypto attacks . | Category . | Item → corresponding impact level → corresponding digit . |
---|---|---|
. | ||
Attack 1 . | Business continuity disruption timeframe . | Up to 1 week → ‘Low’ → 1 . |
Encrypted information critical to business . | Not critical → ‘Low’ → 1 . | |
Information loss . | Some loss acceptable with incremental backups → ‘Low’ → 1 . | |
Affected devices . | One desktop and shares on a server → ‘Low’ → 1 . | |
Recovery time . | Up to 2 weeks → ‘Low’ → 1 . | |
Maximum value | 1 | |
Attack impact level | Low | |
Attack 9 | Business continuity disruption timeframe | Up to 1 week → ‘Low’ → 1 |
Encrypted information critical to business | Critical to high priority functions → ‘High’ → 3 | |
Information loss | Some loss acceptable with incremental backups → ‘Low’ → 1 | |
Affected devices | Several desktops and shares on servers → ‘Low’ → 1 | |
Recovery time | Up to 1 month → ‘Medium’ → 2 | |
Maximum value | 3 | |
Attack impact level | High |
Crypto attacks . | Category . | Item → corresponding impact level → corresponding digit . |
---|---|---|
. | ||
Attack 1 . | Business continuity disruption timeframe . | Up to 1 week → ‘Low’ → 1 . |
Encrypted information critical to business . | Not critical → ‘Low’ → 1 . | |
Information loss . | Some loss acceptable with incremental backups → ‘Low’ → 1 . | |
Affected devices . | One desktop and shares on a server → ‘Low’ → 1 . | |
Recovery time . | Up to 2 weeks → ‘Low’ → 1 . | |
Maximum value | 1 | |
Attack impact level | Low | |
Attack 9 | Business continuity disruption timeframe | Up to 1 week → ‘Low’ → 1 |
Encrypted information critical to business | Critical to high priority functions → ‘High’ → 3 | |
Information loss | Some loss acceptable with incremental backups → ‘Low’ → 1 | |
Affected devices | Several desktops and shares on servers → ‘Low’ → 1 | |
Recovery time | Up to 1 month → ‘Medium’ → 2 | |
Maximum value | 3 | |
Attack impact level | High |
Crypto attacks . | Category . | Item → corresponding impact level → corresponding digit . |
---|---|---|
. | ||
Attack 1 . | Business continuity disruption timeframe . | Up to 1 week → ‘Low’ → 1 . |
Encrypted information critical to business . | Not critical → ‘Low’ → 1 . | |
Information loss . | Some loss acceptable with incremental backups → ‘Low’ → 1 . | |
Affected devices . | One desktop and shares on a server → ‘Low’ → 1 . | |
Recovery time . | Up to 2 weeks → ‘Low’ → 1 . | |
Maximum value | 1 | |
Attack impact level | Low | |
Attack 9 | Business continuity disruption timeframe | Up to 1 week → ‘Low’ → 1 |
Encrypted information critical to business | Critical to high priority functions → ‘High’ → 3 | |
Information loss | Some loss acceptable with incremental backups → ‘Low’ → 1 | |
Affected devices | Several desktops and shares on servers → ‘Low’ → 1 | |
Recovery time | Up to 1 month → ‘Medium’ → 2 | |
Maximum value | 3 | |
Attack impact level | High |
This PDF is available to Subscribers Only
View Article Abstract & Purchase OptionsFor full access to this pdf, sign in to an existing account, or purchase an annual subscription.