Skip to main content

Table 4 Calculating CRPN for each security failure at the network

From: Strengthening information technology security through the failure modes and effects analysis approach

Failure causes

S

O

D

CRPN

Antivirus update

3

5

6

90

Firewall

7

3

4

84

Performance and tuning

2

7

5

70

Password protection

4

7

3

84

Access control list

5

2

8

80

Internet use policy

6

2

7

84

Internal users

3

6

4

72

IT professionals

2

4

5

40

CCTV

3

2

6

36

Biometric

3

4

8

96

Electronic ID cards

2

3

4

24

Terminal

3

3

1

9

Aircraft

3

3

1

9

Internal operations

3

7

4

84

Wireless access

4

8

3

96

Hardware

2

4

4

32

Software

2

2

3

12

Data

3

4

6

72