Statements (22)
Predicate | Object |
---|---|
gptkbp:instanceOf |
risk assessment methodology
|
gptkbp:developedBy |
gptkb:Carnegie_Mellon_University
|
gptkbp:documentedIn |
OCTAVE Method Implementation Guide
|
gptkbp:firstReleased |
1999
|
gptkbp:focusesOn |
information security risk assessment
|
gptkbp:hasVersion |
OCTAVE Allegro
OCTAVE FORTE OCTAVE-S |
https://www.w3.org/2000/01/rdf-schema#label |
OCTAVE
|
gptkbp:openSource |
true
|
gptkbp:platform |
identifying threats
evaluating risks identifying vulnerabilities identifying information assets |
gptkbp:standsFor |
Operationally Critical Threat, Asset, and Vulnerability Evaluation
|
gptkbp:usedBy |
organizations
|
gptkbp:usedIn |
cybersecurity
risk management IT governance |
gptkbp:website |
https://www.sei.cmu.edu/octave/
|
gptkbp:bfsParent |
gptkb:Open_FAIR
|
gptkbp:bfsLayer |
7
|