- From: https://resources.sei.cmu.edu/asset_files/TechnicalReport/2007_005_001_14885.pdf
- Provide a brief explanation of the Operationally, Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methods. Explain how they are beneficial for organizations developing their IT risk management approaches.
- From: https://resources.sei.cmu.edu/asset_files/TechnicalReport/2007_005_001_14885.pdf
- Explain how the size of the organization impacts the OCTAVE method utilized. Determine the factors that large organizations, as opposed to small organizations, are most concerned with.