EGI Security Threat Risk Assessment meeting

Europe/Amsterdam
EVO (Universe)

EVO

Universe

Description
The main aim of this meeting is to finalize the list of threats as much as possible and decide how to further proceed.
    • 1
      Introduction and agenda
    • 2
      Categories and cross referencing
      As Elisa pointed out, the categories are not disjoint. Should we leave them as they are or should we change the categories? If threat belongs in more than 1 - I suggest in 1 place but refer from the other category.
    • 3
      Data Reliability
    • 4
      Threats due to non-availability of IT services
    • 5
      Quick run through threats
    • 6
      Plan for Risk evaluation