Figure 6-1 : Refined trustworthy system status model ( TSSM ) with hazards and threats .
The major revision to the graphic in Figure 6-1 is the assignment of Trustworthiness Security Methods to Threats and the other four trustworthiness method types to hazards .
The TSSM shows only five different status levels . In practice , any system designer or operator can add minor levels between the major levels , which creates specific intermediate levels . For example , not every non-addressed peril in a disrupted system leads automatically to a damaged
Journal of Innovation 13