Talk:Factor analysis of information risk
![]() | This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||
|
This article is based on a proprietary method that charges for commercial use. Fairinstitute.org is a free Open Source standard. — Preceding unsigned comment added by 2601:80:4400:F4F0:DF3:725B:D118:B507 (talk) 01:52, 14 August 2022 (UTC)
Not a stub
Promoted to Start class, after editing. --Pastore Italy (talk) 18:03, 14 November 2010 (UTC)
Copyright problem removed
Prior content in this article duplicated one or more previously published sources. The material was copied from: http://www.riskmanagementinsight.com/media/docs/FAIR_introduction.pdf. Infringing material has been rewritten or removed and must not be restored, unless it is duly released under a compatible license. (For more information, please see
- Text beginning "Six forms of loss are defined with FAIR" - pg 23
- Text beginning "FAIR defines value/liability as" - pg 25
- Text beginning "Threat agents can take one or more of the following actions against an asset" - pg 26
- Text beginning "The risk is decomposed hierarchically in its factors" - headings and boldfaced text from pgs 18-21
- List beginning "Probably Loss Magnitude (PLM)" - almost all text is found somewhere in pgs 25-29
- List beginning "According to FAIR controls have three dimensions" – close paraphrase of pgs 31-32
Recent edits...
The entire tone of the article was changed by the edits made by User:Smjerbic, to the point where a Conflict of interest discussion was opened. Some discussion needs to be had about these edits, especially in light of the replacement of sources and a direct reference to a particular company's implementation. MSJapan (talk) 22:47, 2 August 2016 (UTC)
External links modified
Hello fellow Wikipedians,
I have just modified 2 external links on Factor analysis of information risk. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20141118061526/http://www.riskmanagementinsight.com/media/docs/FAIR_introduction.pdf to http://www.riskmanagementinsight.com/media/docs/FAIR_introduction.pdf
- Added archive https://web.archive.org/web/20120121100248/http://articles.cnn.com/2009-01-27/politics/va.data.theft_1_laptop-personal-data-single-veteran?_s=PM%3APOLITICS to http://articles.cnn.com/2009-01-27/politics/va.data.theft_1_laptop-personal-data-single-veteran?_s=PM%3APOLITICS
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018.
{{source check
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 11:17, 27 September 2017 (UTC)
pathetic article
This is a really ridiculous article that doesn't capture what FAIR is about at all. I practice FAIR almost daily and barely recognize it from this description. The author is obviously more familiar with other cybersecurity risk management models and confuses FAIR with them.
Needs a complete rework. No, I don't volunteer, tired of edit wars. — Preceding unsigned comment added by 194.96.92.160 (talk) 06:57, 10 April 2019 (UTC)