Table of Contents - X.1355 (04/2025) - Security risk analysis framework for Internet of things devices
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Reference model for IoT device 7 Security risk analysis framework for IoT devices 7.1 Phase 1: Determination of a TOA 7.2 Phase 2: Identification of security problems 7.3 Phase 3: Prioritization of threats 8 Utilization of risk analysis results – establishment of security objectives 8.1 Decision on risk mitigation strategy 8.2 Establishment of security objectives Appendix I – An example of risk analysis based on the security risk analysis framework for Internet of things (IoT) devices I.1 Overview I.2 Phase 1: Determination of a TOA I.3 Phase 2: Identification of security problems I.4 Phase 3: Prioritization of threats I.5 Establishment of security objectives based on the result of security risk analysis Appendix II – An example of risk level assessment method II.1 Overview II.2 Risk-scoring system Bibliography
|