Table of Contents - X.1355 (04/2025) - Security risk analysis framework for Internet of things devices

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Reference model for IoT device
7 Security risk analysis framework for IoT devices
7.1 Phase 1: Determination of a TOA
7.2 Phase 2: Identification of security problems
7.3 Phase 3: Prioritization of threats
8 Utilization of risk analysis results – establishment of security objectives
8.1 Decision on risk mitigation strategy
8.2 Establishment of security objectives
Appendix I – An example of risk analysis based on the security risk analysis framework for Internet of things (IoT) devices
I.1 Overview
I.2 Phase 1: Determination of a TOA
I.3 Phase 2: Identification of security problems
I.4 Phase 3: Prioritization of threats
I.5 Establishment of security objectives based on the result of security risk analysis
Appendix II – An example of risk level assessment method
II.1 Overview
II.2 Risk-scoring system
Bibliography