Answer:
- Threat analysis
- Consequence analysis
- Event and Fault tree analyses
- Vulnerability analysis
Step-by-step explanation:
Threat Analysis
Involves the identification of areas of the system in question that are vulnerable to risk and then identifying what those risks are.
Consequence Analysis
With consequence analysis, the possible effects of the risks identified will be analyzed to see how much damage they can cause.
Event and Fault tree analyses
Here a tree is used to show all of the possible effects of a risky activity failing. It is used to find out the cause of the worst case scenario.
Vulnerability analysis
As the term implies, vulnerability analysis is done to see which parts of a system are at risk and how vulnerable they are to this risk and then ranking these vulnerabilities so that they can be prioritized.