Contents Print pageExpand/Collapse all1. Introduction1.1. Cybersecurity Perspective2. Context Definition2.1. Asset Identification2.2. Security Attributes2.3. Stakeholder Modeling2.4. Vulnerability Analysis3. Damage Scenarios4. Threat Identification5. Attacks and Attack Trees5.1. Attack Tree Modeling5.2. Attack Path Calculation6. Risk Assessment6.1. Risk Graph6.1.1. HEAVENS Threat Level Parameters6.1.2. HEAVENS Impact Level Parameters6.1.3. HEAVENS Security / Risk Level7. Risk Treatment7.1. Security Measures7.2. Security Goals and Security Requirements8. Vulnerability Analysis9. Configuration9.1. Cybersecurity Project Settings9.2. Cybersecurity Workspace PreferencesA. References Chapter 1: Introduction »