| Literature DB >> 30332831 |
Wafa Bouaynaya1, Hongbo Lyu2, Zuopeng Justin Zhang3.
Abstract
With the growing popularity of Internet of Things (IoT) and Cyber-Physical Systems (CPS), cloud- based systems have assumed a greater important role. However, there lacks formal approaches to modeling the risks transferred through information systems implemented in a cloud-based environment. This paper explores formal methods to quantify the risks associated with an information system and evaluate its variation throughout its implementation. Specifically, we study the risk variation through a quantitative and longitudinal model spanning from the launch of a cloud-based information systems project to its completion. In addition, we propose to redefine the risk estimation method to differentiate a mitigated risk from an unmitigated risk. This research makes valuable contributions by helping practitioners understand whether cloud computing presents a competitive advantage or a threat to the sustainability of a company.Entities:
Keywords: IS risk; cloud computing; longitudinal study; mathematical modeling; organizational transformation
Year: 2018 PMID: 30332831 PMCID: PMC6210535 DOI: 10.3390/s18103488
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Summary of Notations.
| Notation | Meaning |
|---|---|
| RiA | Attenuated risk |
| P(Ri) | Scenario probability |
| I(Ri) | Severity of impact |
| M(Pr) | Preventive measures |
| M(Ds) | Dissuasive measures |
| M(Pl) | Palliative measures |
| M(Cn) | Containment measures |
Total Risks for Each Phase.
| Uprooting | Construction | Stabilization | Optimization | |
|---|---|---|---|---|
| Σ Unmitigated internal risks: R1in | 123 | 84.5 | 53 | 37 |
| Σ Mitigated internal risks: R2in | 77.5 | 47 | 31.5 | 22.5 |
| Σ Unmitigated external risks: R1ex | 44 | 57.5 | 86 | 125 |
| Σ Mitigated external risks: R2ex | 21.5 | 35 | 50.5 | 77.5 |
Figure 1Evolution of external risks according to time.
Figure 2Evolution of internal risks according to time.
Figure 3Unmitigated risk transfer model.
Figure 4Mitigated risk transfer model.
Client Features.
| Creation Date | 2010 |
|---|---|
| Legal Form | joint stock company |
| Capitalization (2015) | 14 million Euros |
| Turnover (2014) | 4.2 million Euros |
| Number of staff | 200 |
Cloud Provider Features.
| Creation Date | 2010 |
|---|---|
| Legal Form | joint stock company |
| Share capital | 18,000 euro |
| Turnover (2012) | 84,000 euro |
| Number of employees | 10 |
Risk variation measured.
| Uprooting | Construction | Stabilization | Optimization | |
|---|---|---|---|---|
| External Risk | 24.5 | 45 | 75 | 99 |
| Internal Risk | 76.5 | 52 | 34.5 | 23.5 |
Figure 5Measured internal risk variation.
Figure 6Measured external risk variation.
Theoretical risk variation.
| Uprooting | Construction | Stabilization | Optimization | |
|---|---|---|---|---|
| External Risk | 23 | 35 | 53 | 79 |
| Internal Risk | 73 | 49 | 33 | 22 |
Figure 7Measured IT risk transfer.
MEHARI 2010 Standard Scale of Impact Level.
| 4 | level 4 | Vital |
| 3 | level 3 | Very serious |
| 2 | level 2 | Important |
| 1 | level 1 | Not significant |
MEHARI 2010 Standard Scale of Potential Level.
| 4 | level 4 | Very probable |
| 3 | level 3 | Probable |
| 2 | level 2 | Improbable |
| 1 | level 1 | Very improbable |
Effectiveness of MEHARI 2010 deterrence measures.
| level 4 | The deterrent effect is very important |
| level 3 | The deterrent effect is important |
| level 2 | The deterrent effect is medium |
| level 1 | The deterrent effect is very low |
Effectiveness of MEHARI 2010 preventive measures.
| level 4 | The preventive effect is very important |
| level 3 | The preventive effect is important |
| level 2 | The preventive effect is medium |
| level 1 | The preventive effect is very low |
Effectiveness of MEHARI 2010 Containment Measures.
| level 4 | The confinement and limitation effect of direct consequences is very important |
| level 3 | The confinement and limitation effect of direct consequences is important |
| level 2 | The confinement and limitation effect of direct consequences is medium |
| level 1 | The confinement and limitation effect of direct consequences is very low |
Effectiveness of MEHARI 2010 palliative measures.
| level 4 | The effect of limiting indirect consequences is very important |
| level 3 | The effect of limiting indirect consequences is important |
| level 2 | The effect of limiting indirect consequences is medium |
| level 1 | The effect of limiting indirect consequences is very low |
Measures of Theoretical Risk Estimation—General Framework.
| Code | Uprooting | Construction | Stabilization | Optimization | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| P(Ri) | I(Ri) |
|
| P(Ri) | I(Ri) |
|
| P(Ri) | I(Ri) |
|
| P(Ri) | I(Ri) |
|
| |
| AB.P.1 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 |
| AB.P.2 | 3 | 2 | 1 | 0 | 3 | 2 | 1 | 0 | 2 | 2 | 1 | 0 | 2 | 2 | 1 | 0 |
| AB.S.1 | 2 | 3 | 1 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 2 | 3 | 1 | 0 |
| AB.S.2 | 2 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 2 | 3 | 1 | 0 |
| AB.S.3 | 1 | 2 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 |
| AB.S.4 | 4 | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 3 | 0 | 1 |
| AB.S.5 | 4 | 2 | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 3 | 0 | 1 |
| AC.E.1 | 1 | 3 | 0 | 2 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 2 |
| AC.E.2 | 2 | 4 | 0 | 2 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 4 | 0 | 2 |
| AC.E.3 | 2 | 4 | 0 | 2 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 2 | 4 | 0 | 2 |
| AC.M.1 | 2 | 1 | 1 | 0 | 2 | 2 | 1 | 0 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| AC.M.2 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 |
| AV.P.1 | 3 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 |
| ER.L.1 | 1 | 2 | 0 | 0 | 2 | 1 | 0 | 0 | 2 | 2 | 0 | 1 | 1 | 3 | 0 | 1 |
| ER.P.1 | 3 | 1 | 1 | 0 | 3 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 |
| ER.P.2 | 3 | 2 | 1 | 0 | 3 | 2 | 1 | 0 | 2 | 2 | 1 | 0 | 2 | 2 | 1 | 0 |
| ER.P.3 | 4 | 1 | 1 | 0 | 4 | 1 | 1 | 0 | 3 | 1 | 1 | 0 | 3 | 1 | 1 | 0 |
| IC.E.1 | 3 | 1 | 1 | 0 | 2 | 2 | 1 | 0 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 |
| IC.E.2 | 2 | 2 | 0 | 1 | 2 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| IC.E.3 | 2 | 2 | 0 | 1 | 2 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| IC.E.4 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 |
| IF.L.1 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 | 2 | 1 | 1 | 0 |
| IF.L.2 | 2 | 2 | 0 | 1 | 2 | 2 | 0 | 1 | 2 | 2 | 0 | 1 | 1 | 3 | 0 | 1 |
| IF.L.3 | 3 | 2 | 1 | 1 | 2 | 2 | 1 | 1 | 1 | 2 | 0 | 1 | 1 | 3 | 0 | 1 |
| IF.L.4 | 4 | 2 | 2 | 0 | 3 | 2 | 2 | 0 | 2 | 3 | 1 | 1 | 1 | 3 | 0 | 1 |
| MA.L.1 | 1 | 2 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 2 | 0 | 0 | 2 | 3 | 1 | 1 |
| MA.L.2 | 1 | 2 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 2 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.L.3 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.L.4 | 2 | 2 | 0 | 1 | 2 | 2 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.L.5 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.L.6 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.L.7 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| MA.L.8 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 | 1 | 3 | 0 | 0 | 1 | 3 | 0 | 0 |
| MA.L.9 | 2 | 3 | 1 | 0 | 2 | 3 | 1 | 0 | 1 | 4 | 0 | 1 | 1 | 4 | 0 | 0 |
| MA.L.10 | 3 | 3 | 2 | 0 | 3 | 3 | 2 | 0 | 3 | 3 | 2 | 0 | 2 | 3 | 1 | 0 |
| MA.P.1 | 1 | 2 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.P.2 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| MA.P.3 | 1 | 3 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| MA.P.4 | 2 | 2 | 1 | 1 | 2 | 2 | 1 | 1 | 2 | 2 | 1 | 1 | 2 | 2 | 1 | 1 |
| PR.N.1 | 2 | 2 | 1 | 1 | 2 | 2 | 1 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| PR.N.2 | 2 | 2 | 0 | 0 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 |
| PR.N.3 | 2 | 2 | 1 | 0 | 2 | 2 | 1 | 0 | 1 | 2 | 0 | 0 | 1 | 2 | 0 | 0 |
| PR.N.4 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 | 1 | 2 | 0 | 1 |
| IC.C.1 | 0 | 0 | 0 | 0 | 2 | 3 | 0 | 1 | 1 | 3 | 0 | 1 | 1 | 3 | 0 | 1 |
| IC.C.2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 1 | 0 | 1 | 2 | 0 | 0 |
| IC.C.3 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 2 | 2 | 0 | 4 | 3 | 2 | 0 |
| IC.C.4 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 2 | 1 | 0 |
| IC.C.5 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 2 | 1 | 0 |
| RS.P.1 | 0 | 0 | 0 | 0 | 2 | 1 | 1 | 0 | 2 | 2 | 1 | 0 | 0 | 0 | 0 | 0 |
| RS.P.2 | 0 | 0 | 0 | 0 | 2 | 1 | 1 | 0 | 2 | 2 | 1 | 0 | 0 | 0 | 0 | 0 |
| RS.P.3 | 0 | 0 | 0 | 0 | 2 | 1 | 1 | 0 | 2 | 2 | 1 | 0 | 0 | 0 | 0 | 0 |
| RS.P.4 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
| RS.P.5 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Measures of Theoretical Risk Estimation—Type and σ E(Ri).
| Family Type | Code | Event Description | Uprooting | Construction | Stabilization | Optimization | ||||
|---|---|---|---|---|---|---|---|---|---|---|
| Type | σ E(Ri) | Type | σ E(Ri) | Type | σ E(Ri) | Type | σ E(Ri) | |||
| Absence of personnel due to an accident | AB.P | Absence of personnel from partner | ex | 2−1 | ex | 2−1 | ex | 2−1 | ex | 2−1 |
| Absence of internal personnel | in | 6−4 | in | 6−4 | in | 4−2 | in | 4−2 | ||
| Accidental lack or unavailability of service | AB.S | Absence of service: Power supply | in | 6−3 | ex | 1 | ex | 1 | ex | 6−3 |
| Absence of service: air conditioner | in | 2 | ex | 1 | ex | 1 | ex | 6−3 | ||
| Absence of service: impossibility to have access to the premises | in | 2 | ex | 1 | ex | 1 | ex | 3−1 | ||
| Absence or impossibility of application software maintenance | in | 8−6 | in | 0 | ex | 0 | ex | 3−2 | ||
| Absence or impossibility of information system maintenance | in | 8−6 | in | 0 | ex | 0 | ex | 3−2 | ||
| Environmental serious accident | AC.E | Lightning | ex | 3−1 | ex | 3−2 | ex | 3−2 | ex | 3−1 |
| Fire | ex | 8−4 | ex | 3−2 | ex | 3−2 | ex | 4−2 | ||
| Flooding | ex | 8−4 | ex | 3−2 | ex | 3−2 | ex | 8−4 | ||
| Hardware Accident | AC.M | Equipment breakdown | in | 2−1 | ex | 4−2 | ex | 2−1 | ex | 2−1 |
| Accessory equipment breakdown | in | 1 | in | 1 | in | 1 | in | 1 | ||
| Voluntary absence of staff | AV.P | Social conflict with strike | in | 3−2 | in | 2−1 | in | 1 | in | 1 |
| Design error | ER.L | Software blocking or malfunction due to a design or programming error (in-house software) | in | 2 | ex | 2−1 | ex | 4−2 | ex | 3−2 |
| Hardware error or behavioral error by personnel | ER.P | Lost or forgotten document or media | in | 3−2 | ex/in | 3−2 | ex/in | 2−1 | in | 2−1 |
| Error of operation or non compliance of a procedure | in | 6−4 | ex/in | 6−4 | ex/in | 4−2 | in | 4−2 | ||
| Typing or data entry error | in | 4−3 | in | 4−3 | in | 3−2 | in | 3−2 | ||
| Incident due to environment | IC.E | Damage due to aging | in | 3−2 | in | 4−2 | ex/in | 2 | ex | 2 |
| Water damage | in | 4−2 | in | 4−2 | ex/in | 2−1 | ex | 2−1 | ||
| Electrical boosting or over load | in | 4−2 | in | 4−2 | ex/in | 2−1 | ex | 2−1 | ||
| Pollution damage | in | 1 | in | 1 | ex/in | 1 | ex | 1 | ||
| Logical or functional incident | IF.L | Production incident | in | 2−1 | in | 2−1 | in | 2−1 | in | 2−1 |
| Software blocking or malfunction (information system or software package) | in | 4−2 | in | 4−2 | ex | 4−2 | ex | 3−2 | ||
| Saturation due to an external cause (worm) | ex | 6−2 | ex | 4−1 | ex | 2−1 | ex | 3−2 | ||
| Virus | ex | 8−4 | ex | 6−2 | ex | 6−2 | ex | 3−2 | ||
| Malevolent action (logical or functional) | MA.L | Deliberate blocking of accounts | ex/in | 2 | ex | 1 | ex | 2 | ex | 6−2 |
| Deliberate erasure or massive pollution of system configurations | in | 2 | ex | 1 | ex | 2−1 | ex | 3−2 | ||
| Deliberate erasure of files, data bases or media | in | 2 | ex/in | 2 | ex | 3−2 | ex | 3−2 | ||
| Electromagnetic pick up | ex/in | 4−2 | ex | 4−2 | ex | 3−2 | ex | 3−2 | ||
| Deliberate corruption of data or functions | in | 3−2 | in | 3−2 | ex/in | 3−2 | ex/in | 3−2 | ||
| Forging of messages or data | in | 3−2 | ex/in | 3−2 | ex/in | 3−2 | ex/in | 3−2 | ||
| Fraudulent replay of transaction | in | 2−1 | ex | 2−1 | ex | 2−1 | ex | 2−1 | ||
| Deliberate saturation of IT equipments or networks | ex/in | 2 | ex | 2 | ex | 3 | ex | 3 | ||
| Deliberate total erasure of files and backups | in | 6−3 | in | 6−3 | ex | 4−3 | ex | 4 | ||
| Diversion of files or data (tele-load or copy) | in | 9−3 | in | 9−3 | ex/in | 9−3 | ex/in | 6−3 | ||
| Malevolent action (physical) | MA.P | Tampering or falsification of equipment | in | 2−1 | ex | 3−2 | ex | 3−2 | ex | 3−2 |
| Terrorism | ex/in | 3−2 | ex/in | 3−2 | ex/in | 3−2 | ex/in | 3−2 | ||
| Vandalism or hooliganism | ex/in | 3−2 | ex/in | 2−1 | ex/in | 2−1 | ex/in | 2−1 | ||
| Theft of physical asset | ex/in | 4−1 | ex/in | 4−1 | ex/in | 4−1 | ex/in | 4−1 | ||
| Non compliance to procedures | PR.N | Inadequate procedures | in | 4−1 | in | 4−1 | in | 2−1 | in | 2−1 |
| Procedures not applied due to lack of resource or means | in | 4 | in | 2 | in | 2 | in | 2 | ||
| Procedures not applied due to ignorance | in | 4−2 | in | 4−2 | in | 2 | in | 2 | ||
| Procedures not applied deliberately | in | 2−1 | in | 2−1 | in | 2−1 | in | 2−1 | ||
| Cloud Computing Incident | IC.C | Altering data transferred to the cloud | in | 0 | ex/in | 6−4 | ex/in | 3−2 | ex/in | 3−2 |
| Denial of Service | ex | 0 | ex | 0 | ex | 4−2 | ex | 2 | ||
| Unauthorized access to data by a third party (supplier’s personnel, government access by conflict of laws, etc.) | ex | 0 | ex | 0 | ex | 8−4 | ex | 12−6 | ||
| Data backup by vendor after contract termination | ex | 0 | ex | 0 | ex | 0 | ex | 8−6 | ||
| Lack of interoperability between suppliers | ex | 0 | ex | 0 | ex | 0 | ex | 8−6 | ||
| project management Risk | RS.P | Change in the organizational environment that may affect the project stability | in | 0 | in | 2−1 | in | 4−2 | in | 0 |
| Lack of commitment or the cooperation of the actors concerned | in | 0 | in | 2−1 | in | 4−2 | in | 0 | ||
| Poor definition or permanent change of objectives | in | 0 | in | 2−1 | in | 4−2 | in | 0 | ||
| Poor estimation of costs | in | 0 | in | 1 | in | 1 | in | 0 | ||
| Poor estimation of maturities | in | 0 | in | 1 | in | 1 | in | 0 | ||
Measures of Theoretical Risk Estimation from the Case.
| Type | Event | Uprooting | Construction | Stabilization | Optimization | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Type | P(Ri) | I(Ri) | Type | P(Ri) | I(Ri) | Type | P(Ri) | I(Ri) | Type | P(Ri) | I(Ri) | ||
| Absence of personnel due to an accident | AB.P.1 | ex | 0 | 0 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 1 |
| AB.P.2 | in | 1 | 2 | in | 1 | 2 | in | 1 | 2 | in | 1 | 1 | |
| Accidental lack or unavailability of service | AB.S.1 | in | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 |
| AB.S.2 | in | 1 | 1 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 | |
| AB.S.3 | in | 1 | 1 | ex | 1 | 1 | ex | 1 | 1 | ex | 1 | 1 | |
| AB.S.4 | in | 0 | 0 | in | 0 | 0 | ex | 0 | 0 | ex | 1 | 2 | |
| AB.S.5 | in | 0 | 0 | in | 0 | 0 | ex | 0 | 0 | ex | 1 | 2 | |
| Environmental serious accident | AC.E.1 | ex | 1 | 3 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 |
| AC.E.2 | ex | 1 | 4 | ex | 1 | 3 | ex | 1 | 3 | ex | 1 | 3 | |
| AC.E.3 | ex | 1 | 4 | ex | 1 | 3 | ex | 1 | 3 | ex | 1 | 3 | |
| Hardware Accident | AC.M.1 | in | 2 | 2 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 |
| AC.M.2 | in | 3 | 1 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 | |
| Voluntary absence of staff | AV.P.1 | in | 1 | 2 | in | 1 | 2 | in | 1 | 2 | in | 1 | 1 |
| Design error | ER.L.1 | in | 1 | 2 | in | 1 | 2 | ex/in | 1 | 2 | ex/in | 1 | 1 |
| Hardware error or behavioural error by personnel | ER.P.1 | in | 2 | 2 | ex/in | 2 | 1 | ex/in | 1 | 2 | in | 1 | 2 |
| ER.P.2 | in | 2 | 2 | ex/in | 2 | 1 | ex/in | 1 | 2 | in | 1 | 2 | |
| ER.P.3 | in | 2 | 2 | in | 2 | 2 | in | 1 | 2 | in | 1 | 2 | |
| Incident due to environment | IC.E.1 | in | 1 | 2 | in | 1 | 2 | ex/in | 1 | 2 | ex | 1 | 2 |
| IC.E.2 | in | 1 | 2 | in | 2 | 2 | ex/in | 2 | 2 | ex | 2 | 2 | |
| IC.E.3 | in | 2 | 3 | in | 2 | 2 | ex/in | 2 | 2 | ex | 2 | 2 | |
| IC.E.4 | in | 1 | 2 | in | 1 | 2 | ex/in | 1 | 2 | ex | 1 | 2 | |
| Logical or functional incident | IF.L.1 | in | 0 | 0 | in | 1 | 1 | in | 1 | 1 | in | 1 | 1 |
| IF.L.2 | in | 2 | 2 | in | 2 | 1 | ex/in | 1 | 2 | ex/in | 1 | 2 | |
| IF.L.3 | ex | 2 | 2 | ex | 1 | 1 | ex | 1 | 2 | ex | 1 | 2 | |
| IF.L.4 | ex | 2 | 2 | ex | 1 | 1 | ex | 1 | 2 | ex | 1 | 2 | |
| Malevolent action (logical or functional) | MA.L.1 | ex/in | 0 | 0 | ex | 1 | 2 | ex | 1 | 3 | ex | 1 | 3 |
| MA.L.2 | in | 1 | 2 | ex | 1 | 2 | ex | 1 | 3 | ex | 1 | 3 | |
| MA.L.3 | in | 1 | 2 | ex/in | 1 | 2 | ex | 1 | 3 | ex | 1 | 3 | |
| MA.L.4 | ex/in | 1 | 1 | ex | 1 | 1 | ex | 1 | 2 | ex | 1 | 2 | |
| MA.L.5 | in | 2 | 1 | in | 2 | 1 | ex/in | 2 | 2 | ex/in | 2 | 2 | |
| MA.L.6 | in | 2 | 1 | ex/in | 2 | 1 | ex/in | 2 | 2 | ex/in | 2 | 2 | |
| MA.L.7 | in | 2 | 1 | ex | 1 | 1 | ex | 1 | 2 | ex | 1 | 2 | |
| MA.L.8 | ex/in | 2 | 1 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 | |
| MA.L.9 | in | 1 | 3 | in | 1 | 4 | ex | 1 | 4 | ex | 1 | 4 | |
| MA.L.10 | in | 1 | 2 | in | 2 | 2 | ex/in | 2 | 3 | ex/in | 1 | 3 | |
| Malevolent action (physical) | MA.P.1 | in | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 | ex | 1 | 2 |
| MA.P.2 | ex/in | 1 | 3 | ex/in | 1 | 3 | ex/in | 1 | 3 | ex/in | 1 | 3 | |
| MA.P.3 | ex/in | 1 | 3 | ex/in | 1 | 3 | ex/in | 1 | 3 | ex/in | 1 | 3 | |
| MA.P.4 | ex/in | 1 | 2 | ex/in | 1 | 2 | ex/in | 1 | 2 | ex/in | 1 | 1 | |
| Non compliance to procedures | PR.N.1 | in | 1 | 2 | in | 1 | 2 | in | 1 | 2 | in | 0 | 0 |
| PR.N.2 | in | 2 | 2 | in | 1 | 2 | in | 1 | 2 | in | 0 | 0 | |
| PR.N.3 | in | 2 | 2 | in | 2 | 2 | in | 1 | 2 | in | 0 | 0 | |
| PR.N.4 | in | 1 | 1 | in | 1 | 1 | in | 1 | 1 | in | 1 | 1 | |
| Cloud Computing Incident | IC.C.1 | in | 0 | 0 | ex/in | 2 | 2 | ex/in | 2 | 3 | ex/in | 1 | 2 |
| IC.C.2 | ex | 0 | 0 | ex | 1 | 2 | ex | 1 | 3 | ex | 1 | 3 | |
| IC.C.3 | ex | 0 | 0 | ex | 0 | 0 | ex | 2 | 2 | ex | 3 | 3 | |
| IC.C.4 | ex | 0 | 0 | ex | 0 | 0 | ex | 0 | 0 | ex | 2 | 3 | |
| IC.C.5 | ex | 0 | 0 | ex | 0 | 0 | ex | 0 | 0 | ex | 2 | 3 | |
| project management Risk | RS.P.1 | in | 0 | 0 | in | 1 | 1 | in | 1 | 1 | in | 0 | 0 |
| RS.P.2 | in | 0 | 0 | in | 1 | 2 | in | 1 | 2 | in | 0 | 0 | |
| RS.P.3 | in | 0 | 0 | in | 1 | 2 | in | 1 | 1 | in | 0 | 0 | |
| RS.P.4 | in | 0 | 0 | in | 1 | 1 | in | 1 | 1 | in | 0 | 0 | |
| RS.P.5 | in | 0 | 0 | in | 1 | 1 | in | 2 | 1 | in | 0 | 0 | |