| -13 (7 logical and 6 physical) Olive Green-13 (6 logical and 7 physical) Red-12 (6 logical and 6 physical) Purple- 12 (6 logical and 6 physical) OrangeVulnerabilities | Threats | Probability | Impact | Suggested Mitigation Steps |
| | | Physical | | |
| Card access | Network Security | | | |
| Access Roster | Confidentiality | | | |
| Biometrics | Confidentiality | | | |
| Token Key | Confidentiality | | | |
| Security Key Generator | Network Security | | | |
| Video Monitoring | Environmental | | | |
| Lack of IT support/Staff | Availability | | | |
| Social Engineering of social medias | Environmental | | | |
| Attacks on Mobile devices | Integrity | | | |
| Legacy Systems | Integrity | | | |
| Hardware failure | Physical | | | |
| Lack of security Audits | Network Security | | | |
| Missed security patches | Network Security | | | |
| Terminated Employee | Availability | | | |
| Wide Area Application Services | Availability | | | |
| Buffer Overflow | Confidentiality IntegrityAvailability | | | |
| VoIP Technology | Confidentiality IntegrityAvailability | | | |
| Lack of Regular Updates of Antivirus Software | Confidentiality IntegrityAvailability | | | |
| Lack of Physical Security | Confidentiality IntegrityAvailability | | | |
|---|
| Unauthorized Access | Confidentiality | | | |
|---|
| Unauthorized Downloads | Availability | | | |
| Theft of Equipment | Physical | | | |
| Destruction of Equipment | Availability | | | |
| Environmental Disaster | Environmental | | | |
| Equipment Disposal | Environmental | | | |