IIC Journal of Innovation 20th Edition Trustworthy July 2022, 20th Edition | Page 17

Figure 5-1 : System perils model .
Term
Definition Incident The event that a peril targets the system .
Hazard A peril which results in an accident if it targets the system . A hazard occurs randomly and may be visible or hidden .
Software Bug A hazard in the design or implementation of software .
Threat A peril which results in an attack if it targets the system . A threat occurs intentionally and is mostly visible but may be hidden in rare cases .
Peril
A peril is either a hazard or a threat . All specific hazards and threats to a system are the Perils of the System
Accident The result of a hazard-caused incident . The system should be protected with a Trustworthiness Reliability , Safety , Resilience , or Privacy Method .
Attack The result of a threat-caused incident . The system should be protected with a Trustworthiness Security Method .
Table 5-1 : Terms and definitions of the peril model .

6 A REFINEMENT OF THE TSSM

The new graphic distinguishes between hazards and hazards with the corresponding Trustworthiness Methods , see Figure 6-1 .
12 July 2022