Skip to main content

Table 5 Ratings for various aspects of attack potential [51, 52]

From: Risk management-based security evaluation model for telemedicine systems

FactorLevelValue
Elapsed time≤1 day0
≤1 week1
≤1 month4
≤3 months10
≤6 months17
> 6 months19
not practical
ExpertiseLayman0
Proficient3
Expert6
Multiple experts8
Knowledge of systemPublic0
 Restricted3
 Sensitive7
 Critical11
Window of opportunityUnnecessary/unlimited0
 Easy1
 Moderate4
 Difficult10
 None
EquipmentStandard0
 Specialized4
 Bespoke7
 Multiple bespoke9