Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 18 results for the OCTAVE

Collection | September 2014 - Collection OCTAVE-Related Assets

These assets all relate to OCTAVE: What it is, how to use it, and its value.

Technical Note | May 2014 - Technical Note A Taxonomy of Operational Cyber Security Risks Version 2 By James J. Cebula, Mary Popeck, Lisa R. Young

This second version of the 2010 report presents a taxonomy of operational cyber security risks and harmonizes it with other risk and security activities.

Podcast | March 2014 - Podcast Comparing IT Risk Assessment and Analysis Methods By Ben Tomhave, Erik Heidt, Julia H. Allen

In this podcast, the presenters discuss IT risk assessment and analysis, and comparison factors for selecting methods that are a good fit for your organization.

Technical Report | May 2007 - Technical Report Introducing OCTAVE Allegro: Improving the Information ... By Richard A. Caralli, James F. Stevens, Lisa R. Young, William R. Wilson

In this 2007 report, the authors highlight the design considerations and requirements for OCTAVE Allegro based on field experience.

Technical Note | May 2006 - Technical Note Applying OCTAVE: Practitioners Report By Carol Woody, Johnathan Coleman (No Affiliation), Michael Fancher (No Affiliation), Carol Myers (No Affiliation), Lisa R. Young

In this report, the authors describe how OCTAVE has been used and tailored to fit a wide range of organizational risk assessment needs.

User's Guide | June 2001 - User's Guide OCTAVE Method Implementation Guide Version 2.0 Volume 1 ... By Christopher J. Alberts, Audrey J. Dorofee

In this report, the authors describe everything you will need to understand and implement OCTAVE method.

Handbook | January 2005 - Handbook OCTAVE-S Implementation Guide, Version 1 By Cecilia Albert, Audrey J. Dorofee, James F. Stevens, Carol Woody

In this 2005 handbook, the authors provide detailed guidelines for conducting an OCTAVE-S evaluation.

Technical Report | October 2001 - Technical Report OCTAVE Catalog of Practices, Version 2.0 By Cecilia Albert, Audrey J. Dorofee, Julia H. Allen

In this report, the authors describe OCTAVE practices, which enable organizations to identify risks and mitigate them.

Technical Report | December 2001 - Technical Report OCTAVE Criteria, Version 2.0 By Cecilia Albert, Audrey J. Dorofee

This 2001 report defines a general approach for evaluating and managing information security risks.

Book | July 2002 - Book Managing Information Security Risks: The OCTAVE Approach By Christopher J. Alberts, Audrey J. Dorofee

In this book, the authors provide a systematic way to evaluate and manage information security risks through the use of the OCTAVE approach.