Values, Threats and Vulnerabilities Analysis

The module offers a way of structuring assessments and analyses associated with criminal and other undesirable acts and follows the Norwegian Standard for Security Risk Analyses NS5832:2014. The method is based on criminological theory, which identifies three factors that must be present and interact for a security problem to arise: values, threats, vulnerabilities.

VTS-analyse

The module presents a guide to, and descriptions of, the different stages in your analysis. In addition, the module enables you to communicate and store the results efficiently. This makes it easier to revise the analysis and keep it updated over time.

The Values, Threats and Vulnerabilities Analysis module in CIM requires some previous knowledge of this type of analysis, but the module assists you in the progress and structure of your work.

This module can be purchased as a single module installation, or it can be integrated into your existing CIM installation.

Values – Threats – Vulnerabilities

The module offers a way of structuring assessments and analyses associated with criminal and other undesirable acts, and the method is based on criminological theory, which identifies three factors that must be present and interact for a security problem to arise.

The method centres on the values assessment, stating that your values, not threats or vulnerabilities, must be the focus of any sensible use of security resources. If you have identified a value that you want to protect, you then must examine if there is a security context. A security context exists when we have something of value that we want to protect, there is something that threatens this value, and you see the need to implement measures to protect the value. If one of the three factors value, threat, or vulnerability is lacking, you do not have a security context. If this this the case, you are of course still free to use resources on protective measures, but it has no relation to security.

The method uses a social science approach – those involved in the process must use qualitative assessments. This in turn means that the results to a large degree are dependent on the data and information that are available at the time, and that these are interpreted correctly.

Another important aspect of this method is to highlight the complexity of the issues that are being analysed and to identify and reduce uncertainty in the data and the resulting assessments.

The method helps you present risks in a neutral, more approachable way to decisionmakers, in that risks should not be defined by probability and consequences, but rather as the result of an amalgamation of the three separate value, threat and vulnerability assessments.

In other words, the Values, Threats and Vulnerabilities Analysis module is a tool specially adapted both to assess the security risks and help you get through the process, get results, and follow up on them in the future.

Sample pages:

Analysis

Screenshot of a sample trial management interface. The screen shows various text fields and dropdowns related to the setup and analysis of a clinical trial. An orange watermark reads "SAMPLE: Not real data," indicating placeholder information.

Valuation

A computer screen shows a detailed project status report with various sections, including analysis, valuation, and risk assessment. A large orange watermark reads "SAMPLE: Not real data" across the screen.

Threat assessment

Screenshot of a trial assessment interface with tabs for analysis, scoring, assessment strategy, and threat assessment. Contains sections for threat actor analysis, threat levels, comments, and file attachments. "SAMPLE: Not real data" is across the image.

Scenario

A computer screen displaying a software interface titled "Conduct of the HA trial". It shows a pop-up window about a scenario on prisoner transport. "SAMPLE: Not real data" is overlaid diagonally in orange.

Feel free to get in touch by phone, e-mail, or in the contact form below.