Annex II - Risk Assessment Spreadsheet
Annex II - Risk Assessment Spreadsheet
Annex II - Risk Assessment Spreadsheet
0
Enabling automated air travel by identifying
the challenges of IoT & RFID tech
Assessment Spreadsheet
Asset Value Measurement Scale
Value Magnitude
1 Very Low
2 Low
3 Medium
4 High
5 Very High
Vulnerability
Value 1
Threat
Value 1 2 3 4 5
1 0 1 2 3 4
Asset Value
2 1 2 3 4 5
Asset Value
3 2 3 4 5 6
4 3 4 5 6 7
5 4 5 6 7 8
Metrics
[scales used to assess assets, vulnerabilties, threats and risks]
surement Scale
Maximum Risk
8 9 10 11 12 13
Medium High Very High
2 3
1 2 3 4 5 1 2 3 4
2 3 4 5 6 3 4 5 6
3 4 5 6 7 4 5 6 7
4 5 6 7 8 5 6 7 8
5 6 7 8 9 6 7 8 9
6 7 8 9 10 7 8 9 10
4 5
5 1 2 3 4 5 1 2 3
7 4 5 6 7 8 5 6 7
8 5 6 7 8 9 6 7 8
9 6 7 8 9 10 7 8 9
10 7 8 9 10 11 8 9 10
11 8 9 10 11 12 9 10 11
5
4 5
8 9
9 10
10 11
11 12
12 13
Assets
[tangible or intangible: any devices, technologies, a
A2 Electronic visa issuing process Process of getting a visa and linking with State, citizens 4
check-in [not mandatory at this stage]
A3 Luggage and goods handling Process for managing the flow of luggage Airlines, airport 3
and supplies to shops and airport operations
A4 Automated traffic management Getting to and from the airport; smart Airport, state, commercial 4
routing; does not include air traffic operators
management
A5 Passports and National ID cards Passports and national ID cards RFID- State/national authority 4
equipped, with digital photo and biometrics issuing it, citizen/passenger
(fingerprint). The devices may store the
following data:
- Personal data
- Biometrics, such as facial image, fingeprints
A6 Mobile ‘smart’ devices Small computing devices that allow the Citizen/passenger 4
transmission of voice and data. Functions For electronic boarding passes
integrated usually in one device: Mobile and /or visas, the owner could
phone, digital camera (working also as 2D also be the airline company
barcode reader), NFC reader/tag, Bluetooth, and state, respectively.
LCD (2D barcode can be displayed), GNSS
receiver. Smart phones, PDAs, laptops, e-
book reader etc. The devices may store the
following data:
- Personal data
- Personal preferences
- Location data
- Electronic boarding passes
- Electronic visa
They may also store and/or generate
- Non-personal data
- Passports and National ID cards
- Passenger Name Record data
A8 Travel documents (paper) Paper versions of tickets and boarding Citizen/passenger, airline 3
passes. May contain the following data: company
- Personal data
- Location data
- Non-personal data
A9 RFID & barcode readers Readers in automatic check-in kiosks, State, Airport authorities, 4
security control, etc as well as passenger airlines, companies,
mobile devices passengers
A10 Credit Cards/Debit card/Payment RFID-enabled or not. Used to make Citizen/passenger, issuing 4
cards/'e-wallet' transactions. bank
A11 Other RFID cards Transport systems and small payments Issuing companies and 3
cards, frequent-flyer RFID-based cards. authorities, passengers
A12 Scanners & detectors Liquids and gels (LAG) detectors; Body Airports, State, Security 3
scanners companies
A14 State databases Database containing data on passengers State, International bodies 4
held by the State authorities for official (SIS, Interpol, Europol)
travel purposes.
A15 Commercial and other databases Databases containing data on passengers Companies, shops, travel 4
held by others not related to the State agencies
databases in A14.
A16 Temporary handset airport guides Device given to passengers to help them Airport management 2
navigate the airport and to provide
translation facility
A20 Cars / vehicles Cars /vehicles used in the scenario Citizens / state 4
Assets
ny devices, technologies, applications, processes, data of value ]
Impact Areas
(as in worksheet "Impact Areas")
IA1 IA2 IA3 IA4 IA5 IA6 IA7 IA8 IA9
2 4 2 2 3 3 3 4 2
2 4 3 2 3 4 3 4 2
2 3 2 1 2 2 3 3 2
2 3 1 1 2 2 2 4 2
2 4 3 2 3 4 3 4 2
2 4 2 2 2 3 3 4 3
5 2 3 2 2 2 2 3 2
2 3 2 2 3 3 1 3 2
2 3 2 1 2 4 2 3 2
2 4 2 2 2 2 4 4 2
2 3 2 1 1 2 2 3 2
2 3 3 2 2 2 2 2 1
2 4 3 2 2 2 3 3 3
3 3 4 4 4 3 2 2 2
2 3 4 3 3 1 2 3 2
1 2 2 2 1 2 2 2 2
2 3 2 2 1 2 2 3 2
2 3 2 2 2 3 3 3 2
1 3 2 1 1 2 3 3 2
3 3 1 1 1 4 2 4 1
IA10 IA11
3 3
3 3
3 3
2 2
4 2
3 3
4 2
3 2
3 2
4 3
2 2
3 2
4 2
4 2
3 3
1 1
2 2
2 2
2 3
1 3
Impact Areas
[estimation of impact of the identified threats; it is closely related to the as
No. Impact
I10 Trust
Description
Refers to the physical and psychological condition of an individual; his/her physical and psychological well-being and absence of diseas
Trust is essential in all aspects of the scenario. Passengers must trust the information on their devices. Operators must trust personal d
provided, and information provided to them by other operators. Trust is also needed in the automated procedures by airlines and airp
operators. And border authorities must likewise trust in the systems to perform.
Implemented Controls
[existing safeguards etc. already in place and that need to be considered. These may
C7 Security checks in smart corridors with metal detectors, EDS and LAG
detectors
C8 Airport security monitoring and emergencies identification through the usage
of smart devices
C8 Airport security monitoring and emergencies identification through the usage
of smart devices
C8 Airport security monitoring and emergencies identification through the usage
of smart devices
C9 Departure Control System (DCS)
C11 Global Entry System authentication for schengen visa holders using PNR
C15 Website RFID tags on purchased goods for identification of the rightful owner
C16 Reception of purchased goods after scanning the boarding pass on a specific
reader inside the plane
C17 Reception of purchased goods after scanning the boarding pass on a specific
reader inside the plane
C17 Automated return of unused credit from TfL
C18 Flight confirmation during goods purchase
C18 Flight confirmation during goods purchase
C19 GPI RFID chip
C20 GA message for boarding
C21 Special seats embedded with pressure and temperature sensors on aircraft
Preventive Manual
Preventive Automated
Preventive Manual
Preventive Automated
Preventive Automated
Preventive Automated
Preventive Automated
Preventive Automated
Preventive Deterrent Automated
Detective Automated
Detective Automated
Detective Automated
und in the assumptions for example]
Affected Assets
V6 3
V24 2
V25 Inherent features (size, material etc.): easy to lose, to be stolen and/or 3
copied (especially for RFID tags)
V42 Lack of respect to the rights of the data subject (such as the right for 2
rectification, blocking or deletion of data)
3 1.8
This vulnerability is due to the difficulty of using device interfaces.
The interfaces are not intuitive or user friendly. It may arise from
excessive or unnecessary functionality options available to the
users. A device may be too complicated for ease of use.
4 2.4
A simple example of the lack of interoperability appears when the
RFID reader at the airport cannot write data to the RFID tag on
Akira's suitcase. This vulnerability is depending on the governance.
4 2.4
This vulnerability arises when systems do not collect enough or
appropriate data or garble the data they do collect. For example, the
data collected by passenger name records (PNR) may not be
sufficient to identify a terrorist or an improper entry on no-fly lists,
incorrect entries in relation to visa status, and mistaken
identification of individuals by commercial entities
2 0.8
Poorly designed devices or systems may create a vulnerability,
whereby they are not sufficiently robust or resilient to withstand
attacks by hackers (for example) or they may not do what is
expected of them, especially at critical times.
2 1.2
Biometrics are not 100 per cent reliable. Part of the reason why they
are not may occur at the enrolment stage when an individual's iris
or fingerprints or other feature are scanned.
2 0.8 Security or other procedures may vary from one airport to another,
creating opportunities for evil-doers.
3 1.2
4 2.4 It's often been said that the weakest link in any system is human. If
personnel are inadequately trained, they become a vulnerability.
They need to be trained adequately to detect and understand
security threats and what to do in the event of a system
malfunction.
3 1.2 Too many people may have access to personal information. Often
the biggest threat comes from insiders.
3 1.2
2 0.8 The data collected and processed shall be adequate, relevant and
not excessive in relation to the purposes they are collected. An
example of such lack of respect to the data minimisation and
proportionality principles can be mentioned the case, when an LBS
system collects not only the information absolutely needed for the
provision of the service, but it also stores excessive information.
The need-to-know principle is not enforced by any means.
4 3.2 When the purpose limitation principle is not respected, more data
are collected and processed than is strictly necessary the specified
purpose. For instance, Christina's approximate physical location is
revealed to both the cell communication provider as well as the
navigation service that provides the map and traffic conditions
applications.
4 3.2 Lack of respect to the transparency principle means that the data
subject is not able to determine the relevant data processing
practices. In the IoT a lot of information is transmitted and
processed via automated processes, most of which remain
unnoticed by the data subject.
3 1.8 While the traffic and local map are being downloaded in real time,
Christina's approximate physical location is revealed to both the cell
communication provider as well as the navigation service that
provides the map and traffic conditions applications. Appropriate
identity management would protect Christina's privacy in this case.
4 1.6
2 0.8 Biometric identification has relatively high error rates (especially
automatic face recognition). Also modern biometric sensors
(especially fingerprint and iris sensors) are difficult to compromise
('liveness detection'), still is also possible to spoof them. Awareness
of imperfection of biometric systems is an important factor of
overall security [P. Rotter (ed.) Biometrics Deployment Study. Large-
scale biometrics deployment in Europe. Identifying challenges and
threats. JRC-IPTS report EUR 23564 EN 2008, ISBN 978-92-79-
10657-6. Available at: http://ftp.jrc.es/EURdoc/JRC48622.pdf
2 0.8
4 2.4 Inherent vulnerability of cards and devices (passports, RFID tags,
etc.): they are small in size, and they are easy to lose, be stolen
and/or copied.
3 1.2
Malicious RFID readers may be able to operate from a distance
several times longer than the intended range (Kirschenbaum &
Wool 2006). Moreover, shielding of RFID is often not possible.
2 0.8
Unlike mobile phones or PDAs, most RFID tags cannot be turned off
and are always ready to send data for a request received by radio
waves. This feature is an inherent vulnerability.
2 0.8
In RFID and contactless smart cards, due to limited resources, the
methods for protection against reverse engineering, such as dummy
structures, scramble buses and memory cells, etc., are rarely
applied. Active methods for detection of reverse engineering attack
are impractical in these devices.
1 0.6 In case RFID and contactless smart cards, due to limited resources,
manufacturers often apply light cryptography and proprietary
cryptographic methods.
2 0.8
Some devices are not 100 per cent reliable. They may produce
inaccurate results or make false positives or negatives.
3 1.2
3 1.8
Devices used by a great number of people every day [health issues
(e.g. infectious diseases spread by fingerprint scanners)]
3 1.8
Face-based identification has the highest social acceptance among
all biometric identification methods. Unfortunately, it has also high
error rates, which leads to many false alarms and/or false
acceptances.
3 1.8
3 1.8
5 4
Due to limited resources, RFID tags often use light, proprietary
cryptography, which in some cases is not sufficient. Identifiers of
tags which are sent in the beginning of communication are not
encrypted at all (as a part of anti-collision protocol) and they may
be used e.g. for tracking of people.
4 2.4
The processing of personal data is supposed to be legitimate.
However, some data controllers and data processors may not have
obtained the informed consent of data subjects.
3 1.8 Personal data are supposed to be deleted when they are no longer
necessary for the purposes for which they were collected or
processed.
3 1.2
Data subjects are supposed to be given the opportunity to rectify
incorrect data or to block its further use. For instance, Akira wishes
to unsubscribe from "Hazukashi Not" service and to have his
account deleted.
Threats and Threa
[perceived threats that could exploit the identifi
Threat Agent
Threat
Threats (source of threat or person who
ID
initiates threat)
T1 Denial of service attack / flood / buffer overflow Vandals/terrorists/Corporate
raiders/professional criminals/hackers/
rogue; State
T9 Loss or misuse [of cards, devices etc] Passenger, airport and airline
personnel
T10 Use erroneous and/or unreliable data
T11 Procedures / instructions not followed Airport and airline personnel.
Passengers
T12 Non-compliance with data protection legislation Commercial establishments, State
T13 Function creep (data used for other purposes than the ones for which they Commercial establishments
were originally collected)
T14 Unauthorized check-in and boarding / identity theft Hacker, criminal, terrorist
T16 Unauthorised access to other restricted areas (apart from boarding e.g. Hacker, criminal, terrorist
Control room, personnel's' offices)
T18 Blocking
T20 Fake / rogue rfid readers / scanning of rfid reader and /or tag
T30 Low acceptance of devices / equipment / procedures Passengers / citizens / airport & airline
personnel
T33 Exclusion of the data subject from the data processing process Commercial establishments, State
TA Capacity
TA Motivation (knowledge Comments
etc.)
The ease with which data can be collected, aggregated and mined coupled with the
To collect large volume of motivation of large financial paybacks make this a widespread threat. Roger Clarke
potentially personal coined the term dataveillance to describe the phenomenon of surveillance by means
sensitive data for market of data analysis. Both airports and governments may also have an interest in
analysis and profit making analysing data, to prevent terrorist related incidents, to develop more targeted
(H) 5 advertising.
This threat is often found in conjunction with or preparation for another attack aimed
at revealing protected sensitive operations. The threat gleans data implied in network
communication patterns. Traffic analysis requires special skill and knowledge to be
High effective.
This is one of the most common attack methods, especially for information collection.
However, such attacks on RFID and smart cards do not occur very often. Such attacks
are usually carried to appropriate others' identity rather than getting access to
To hijack network restricted areas or data, which is usually encrypted. Man-in-the-middle (or relay)
communication channel for attacks for contactless smart card has been theoretically analysed by Kfir and Wool
sensitive data collection (2005). For practical aspects, see Hancke (2005). Countermeasures such as distance
and misinformation feeding bounding based on response time (Hancke & Kuhn 2005; Reid et al. 2006) or signal-
and identity theft (HML) 4 to-noise rate (Fishkin & Roy 2003) are rarely applied.
To obtain sensitive Social engineering attacks are widespread and too-often effective. They play upon
information and system gullibility or human psychological weakness. Phishing could be regarded as a form of
penetration 4 social engineering.
There will always be evil-doers engaged in theft of others' property, be it smart cards,
Financial gain, criminal smart phones or whatever. Theft is not, of course, the only crime. Extortion, fraud and
activities (H) 4 many other crimes are common in cyberspace.
This attacks refers to unauthorized access to data stored on RFID, smart cards
(especially contactless) and personal devices. Also databases can be a subject of
attack though the network, as well as data can be illegally accessed and modified by
unauthorized personnel.
This threat arises when, for example, a passenger doesn't follow instructions and
makes a jam in the automated passport/immigration control or smart corridor.
This threat arises when governments and business do not comply with provisions of
data protection legislation and the principles stated therein, for example, regarding
data minimisation, purpose specification, proportionality, informed consent, access
4 to data by the data subject, etc.
Function creep occurs when data are used for other purposes than the ones for which
they were originally collected for. For example, in the air traffic scenario, a car rental
company doing some market analysis might approach an airport operator to gain
4 access to its data on airport parking.
For example, an attacker might use a fake fingerprint with a stolen passport to board
the plane.
An RFID clone can be either physically similar to the original tag or can be a notebook
with a special antenna. Cloning is relatively easy for basic tags but even some
advanced and apparently well protected tags with a challenge-response protocol
Medium-High Medium-High have been cloned (Juels 2005; Bono et al. 2005; Courtois et al. 2008).
This threat can arise as a result of stealing or cloning authorisation tokens (like smart
cards).
Smart cards or RFID tags may be subject to side channel attacks based on information
gained from physical implementation of a cryptosystem, like variations of power
consumption, time of computations or electromagnetic field (Bar-El 2003). It is often
combined with other cryptanalysis methods.
RFID or a GSM network can be blocked by exploiting vulnerabilities of information
exchange protocols. Blocking can be also useful as a way to protect consumers'
privacy (Juels, Rivest, Szydlo 2003).
System operation
interruption to futher Jamming is malicious interference of a radio transmission. It can result in denial of
achieve attack steps such as service and forcing a system to use fallback procedures. Large-scale jamming requires
spoofing or decoyed attacks extensive equipment setup and exposure of the transmission source. It is not
(L) 4 commonly practised unless with a clear and critical agenda.
RFID Tags can be read by any RFID reader. Therefore, rogue RFID readers can scan for
RFID and be used for unauthorized reading of information from a tag. As RFIDs often
have light cryptography schemes (if any), powerful back-end systems can break the
code in minutes, making the security protection ineffective. The range of a reader
may be extended several times beyond the standard communication distance, for
example ISO 14443 cards with standard range 10 cm can be scanned from 25-35 cm,
which is enough to read a card in someone's pocket. Main countermeasures are:
encryption, authentication of the reader, using short-range tags, shielding tags with
an anti-skimming material (e.g. aluminium foil) and moving sensitive information to a
protected database in the system's backend.
The easiest way to disrupt RFID systems is to physically destroy the tags. Destruction
becomes a serious issue when RFID tags are used as anti-theft protection. RFID tags in
e-passports can be destroyed by owners who have concerns about possible abuse of
their privacy - especially as an e-passport with a non-working RFID tag is still valid
(Wortham 2007).
This threat occurs when systems or devices malfunction due to
n/a n/a hardware/software/implementation errors.
Worms, viruses and malicious code are a part of our daily cyber life. They are a
prevalent and effective way of disrupting systems. Even very simple RFID tags, such as
Service disruption, system those used for tagging goods, can carry a malicious code (Rieback at al. 2006).
compromise, information
theft 4
This threat might be aimed at forcing a system to use fallback procedures, e.g., in
order to get unauthorised access to restricted areas.
This threat is of low probability but potentially high consequence. The destruction
wrought by natural disasters is difficult to predict. It could affect airport and
n/a n/a telecommunication (network) operations.
Initial attack step to further Personal mobile devices may create ad hoc networks in order to exchange data and
achieve cloning, man-in- information between users. These networks can be used by attacker to break into
the-middle attack, or personal devices and compromise the communication and information exchange
service interruption which between parties. For example, DOS attacks can flood ad-hoc networks; rogue
leads to system participants can de-route or compromise legitimate messages and information
compromise (M) 4 exchanges.
RFID is perceived by many people as a privacy threat. They have been called
"spychips" (Albrecht, McIntyre 2005). Most of the concerns presented during an EU
public consultation on RFID were related to privacy (Maghiros, Rotter, van Lieshout
2007). Also some biometrics have low social acceptance, especially fingerprints which
are commonly regarded as linked to criminal investigations.
The abundance of data collected and processed in the IoT and their storage in
4 databases (commercial and state) facilitate their linkability.
The abundance of data collected and processed in the IoT can lead to the creation of
user profiles (relating to consumer preferences, travelling habits, etc.).
4
The automatisation of the processes in the IoT threatens to exclude the data subject
from the data processing process.
4
The use of unique identifiers, such as the human fingerprint, is increasingly being
used for trivial transactions, such as in the case when Elena registers her fingerprint in
order to "secure" her boarding pass.
4
Threat Assessment
Value
T
3 1
.
T
4 3
.
T
3 4
.
T
3 5
.
T
4 6
.
T
4 7
.
T
4 8
.
4
T
3 1
1
T
4 1
2
T
4 1
3
T
3 1
5
T
3 1
6
T
2 1
7
T
2 1
8
T
2 1
9
T
3 2
0
T
4 2
1
T
3 2
4
T
3 2
5
T
5 2
6
3
T
4 2
8
T
2 2
9
T
4 3
0
T
4 3
1
T
4 3
2
T
4 3
4
Mapping of Assets and Vulnerabilities
Asset ID Assets
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
A13 Networks
V4. Lack of or low user awareness and/or training in procedures, use of devices, security aspects etc
3
V24. Inherent features (size, material etc.): easy to lose, stolen and/or copied (expecially for RFID tags)
4
V6. Lack of interoperability between devices and/or technologies and/or systems
3
V9. Lack of or inadequate logical access (identification, authentication and authorisation) and physical
access controls 2
V25. Actual RFID range longer than standard
4
V26. RFID tags do not have a turn-off option
3
V27. Insufficient protection against reverse engineering
3
V28. Inadequate security measures of data storage (e.g. inadequate encryption measures)
4
V31. Devices & equipment used in unprotected environments
3
V13. Lack of or inappropriate protection of RFID tags
4
V12. Lack of harmonisation and interoperability of procedures
3
V18. Lack of respect to the data minimisation and proportionality principles
4
V21. Inappropriate / inadequate identity management
3
V22. Collision of tag traffic / Radio-frequency interference
2
V31. Devices & equipment used in unprotected environments
4
V38. Lack of common or harmonised legislation in EU Member States
3
V39. Insufficient protection of wireless networks and communication (weak or no encryption etc.)
4
V18. Lack of respect to the data minimisation and proportionality principles
3
V40. Lack of respect to the legitimacy of data processing, e.g. consent
4
V21.Lack of appropriate user procedures, especially regarding the collection and processing of persona
data: lack of informed consent, insufficient definition of the purpose for which the data are collected for,
lack of transparency (the user doesn't know when his data are being accessed, by whom and why) 4
V4. Lack of or low user awareness and/or training in procedures, use of devices, security aspects etc
3
V24. Inherent features (size, material etc.): easy to lose, stolen and/or copied (expecially for RFID tags)
3
V6. Lack of interoperability between devices and/or technologies and/or systems 3
V9. Lack of or inadequate logical access (identification, authentication and authorisation) and physical
access controls 2
V25. Actual RFID range longer than standard 4
V26. RFID tags do not have a turn-off option 3
V27. Insufficient protection against reverse engineering 3
V28. Inadequate security measures of data storage (e.g. inadequate encryption measures)
4
V31. Devices & equipment used in unprotected environments 3
V13. Lack of or inappropriate protection of RFID tags 4
V12. Lack of harmonisation and interoperability of procedures 3
V21. Inappropriate / inadequate identity management 3
V22. Collision of tag traffic / Radio-frequency interference 2
V31. Devices & equipment used in unprotected environments 4
V38. Lack of common or harmonised legislation in EU Member States 3
V39. Insufficient protection of wireless networks and communication (weak or no encryption etc.)
3
V18. Lack of respect to the data minimisation and proportionality principles 3
V40. Lack of respect to the legitimacy of data processing, e.g. consent 4
V1. Inappropriate design of procedures - includes: lack of accountability, high complexity of procedures,
assigning extensive responsibilities to end-users (in critical parts of the procedures) etc. 2
V28. Inadequate security measures of data storage (e.g. inadequate encryption measures)
2
V35. High data linkability 4
V36. Lack of data correction mechanisms (as normally data subjects do not have access to the
databases) 4
V40. Lack of respect to the legitimacy of data processing, e.g. consent 4
V41. Lack of respect to the data conservation principle 4
V42. Lack of respect to the rights of the data subject (such as the right for rectification, blocking or
deletion of data). 4
V38. Lack of common or harmonised legislation in EU Member States 4
V4. Lack of or low user awareness and/or training in procedures, use of devices, security aspects etc
4
V5. Lack of usability / unfriendly user interface(s) of device(s) 2
V6. Lack of interoperability between devices and/or technologies and/or systems 2
V14. Lack of sufficiently skilled and/or trained personnel [airport, ariline] 3
V15. Insufficient equipment 2
V24. Inherent features (size, material etc.): easy to lose, stolen and/or copied (expecially for RFID tags)
2
V32. Used by a great number of people every day [health issues (e.g. infectious diseases spread by
fingerprint scanners)] 1
V13. Lack of or inappropriate protection of RFID tags 3
V22. Collision of tag traffic / Radio-frequency interference 2
V24. Inherent features (size, material etc.): easy to lose, stolen and/or copied (expecially for RFID tags)
3
V25. Actual RFID range longer than standard 2
V26. RFID tags do not have a turn-off option 2
V1. Inappropriate design of procedures - includes: lack of accountability, high complexity of procedures,
assigning extensive responsibilities to end-users (in critical parts of the procedures) etc. 3
V24 0
V24 0
V24 0
0
V24
V24 0
Inherent features (size, material etc.): easy to lose, to be stolen and/or copied
V25 (especially for RFID tags)
Inherent features (size, material etc.): easy to lose, to be stolen and/or copied
V25 (especially for RFID tags)
Inherent features (size, material etc.): easy to lose, to be stolen and/or copied
V25 (especially for RFID tags)
Actual RFID range longer than standard
V26
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A1 Automated reservation, check-in and V1. Inappropriate design of procedures - includes: lack of
boarding procedure accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' stolen and/or copied (expecially for RFID tags)
4
A10 Credit Cards/Debit card/Payment cards/'e- V24. Inherent features (size, material etc.): easy to lose, to be
wallet' 4 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V4. Lack of or low user awareness and/or training in procedures,
use of devices, security aspects etc
3
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
3
A11 Other RFID cards V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A11 Other RFID cards V25. Actual RFID range longer than standard
3
A11 Other RFID cards V26. RFID tags do not have a turn-off option
3
A11 Other RFID cards
3
V27. Insufficient protection against reverse engineering
A11 Other RFID cards V27. Insufficient protection against reverse engineering
3
A11 Other RFID cards V28. Inadequate security measures of data storage (e.g.
3 inadequate encryption measures)
A11 Other RFID cards V31. Devices & equipment used in unprotected environments
3
A11 Other RFID cards V31. Devices & equipment used in unprotected environments
3
A11 Other RFID cards V12. Lack of harmonisation and interoperability of procedures
A11 Other RFID cards V38. Lack of common or harmonised legislation in EU Member
3 States
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
3 responsibilities to end-users (in critical parts of the procedures)
etc.
A12 Scanners & detectors V32. Used by a great number of people every day [health issues
3 (e.g. infectious diseases spread by fingerprint scanners)]
A12 Scanners & detectors V32. Used by a great number of people every day [health issues
3 (e.g. infectious diseases spread by fingerprint scanners)]
A12 Scanners & detectors V32. Used by a great number of people every day [health issues
3 (e.g. infectious diseases spread by fingerprint scanners)]
A12 Scanners & detectors V33. High error rates of biometric identification (esp. face-based
3 recognition)
A12 Scanners & detectors V29. Over-sensitivity of devices (give many false alarms)
3
A12 Scanners & detectors V22. Collision of tag traffic / Radio-frequency interference
A13 Networks
4
V2. Excessive dependency on IT systems, network and external
infrastructure
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks
4
V3. Lack of back-up / failover procedures
A13 Networks V4. Lack of or low user awareness and/or training in procedures,
use of devices, security aspects etc
4
A13 Networks
4
V4. Lack of or low user awareness and/or training in procedures,
use of devices, security aspects etc
A13 Networks V5. Lack of usability / unfriendly user interface(s) of device(s)
4
A13 Networks
4
V5. Lack of usability / unfriendly user interface(s) of device(s)
A13 Networks
4
V5. Lack of usability / unfriendly user interface(s) of device(s)
A13 Networks
4
V5. Lack of usability / unfriendly user interface(s) of device(s)
A13 Networks
4
V5. Lack of usability / unfriendly user interface(s) of device(s)
A13 Networks
4
V5. Lack of usability / unfriendly user interface(s) of device(s)
A13 Networks
4
V6. Lack of interoperability between devices and/or technologies
and/or systems
A13 Networks
4
V6. Lack of interoperability between devices and/or technologies
and/or systems
A13 Networks
4
V6. Lack of interoperability between devices and/or technologies
and/or systems
A13 Networks
4
V6. Lack of interoperability between devices and/or technologies
and/or systems
A13 Networks
4
V6. Lack of interoperability between devices and/or technologies
and/or systems
A13 Networks
4
V8. Dependency on power systems
A13 Networks
4
V8. Dependency on power systems
A13 Networks
4
V8. Dependency on power systems
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V21. Inappropriate / inadequate identity management
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks V39. Insufficient protection of wireless networks and
4 communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks V39. Insufficient protection of wireless networks and
4 communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A13 Networks
4
V39. Insufficient protection of wireless networks and
communication (weak or no encryption etc.)
A14 State databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A15 Commercial and other databases V20. Lack of respect to the transparency principle
A15 Commercial and other databases V28. Inadequate security measures of data storage (e.g.
4 inadequate encryption measures)
A17 Luggage and goods V13. Lack of or inappropriate protection of RFID tags
3
A17 Luggage and goods V13. Lack of or inappropriate protection of RFID tags
3
A18 Check-in infrastructure V33. High error rates of biometric identification (esp. face-based
3 recognition)
A19 Airport facilities V5. Lack of usability / unfriendly user interface(s) of device(s)
3
A19 Airport facilities V32. Used by a great number of people every day [health issues
3 (e.g. infectious diseases spread by fingerprint scanners)]
A19 Airport facilities V32. Used by a great number of people every day [health issues
(e.g. infectious diseases spread by fingerprint scanners)]
3
A19 Airport facilities V32. Used by a great number of people every day [health issues
3 (e.g. infectious diseases spread by fingerprint scanners)]
A2 Electronic visa issuing process V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A2 Electronic visa issuing process V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A2 Electronic visa issuing process V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A2 Electronic visa issuing process V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A2 Electronic visa issuing process V1. Inappropriate design of procedures - includes: lack of
accountability, high complexity of procedures, assigning extensive
4 responsibilities to end-users (in critical parts of the procedures)
etc.
A2 Electronic visa issuing process V12. Lack of harmonisation and interoperability of procedures
A2 Electronic visa issuing process V20. Lack of respect to the transparency principle
4
A2 Electronic visa issuing process V20. Lack of respect to the transparency principle
A2 Electronic visa issuing process V42. Lack of respect to the rights of the data subject (such as the
right for rectification, blocking or deletion of data).
4
A3 Luggage and goods handling V13. Lack of or inappropriate protection of RFID tags
3
A3 Luggage and goods handling V13. Lack of or inappropriate protection of RFID tags
3
A3 Luggage and goods handling V25. Actual RFID range longer than standard
3
A3 Luggage and goods handling V25. Actual RFID range longer than standard
3
A3 Luggage and goods handling V12. Lack of harmonisation and interoperability of procedures
A3 Luggage and goods handling V5. Lack of usability / unfriendly user interface(s) of device(s)
3
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
3
A3 Luggage and goods handling V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A4 Automated traffic management V40. Lack of respect to the legitimacy of data processing, e.g.
consent
4
A4 Automated traffic management V42. Lack of respect to the rights of the data subject (such as the
4 right for rectification, blocking or deletion of data).
A5 Passports and National ID cards V11. Lack of adequate controls in biometrics' enrollment stage
4
A5 Passports and National ID cards V11. Lack of adequate controls in biometrics' enrollment stage
4
A5 Passports and National ID cards V11. Lack of adequate controls in biometrics' enrollment stage
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
4
A5 Passports and National ID cards V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A5 Passports and National ID cards V25. Actual RFID range longer than standard
4
A5 Passports and National ID cards V26. RFID tags do not have a turn-off option
4
A5 Passports and National ID cards V27. Insufficient protection against reverse engineering
4
A5 Passports and National ID cards V28. Inadequate security measures of data storage (e.g.
4 inadequate encryption measures)
A5 Passports and National ID cards V12. Lack of harmonisation and interoperability of procedures
4
A5 Passports and National ID cards V12. Lack of harmonisation and interoperability of procedures
4
A5 Passports and National ID cards V12. Lack of harmonisation and interoperability of procedures
A5 Passports and National ID cards V22. Collision of tag traffic / Radio-frequency interference
A5 Passports and National ID cards V31. Devices & equipment used in unprotected environments
4
A5 Passports and National ID cards V31. Devices & equipment used in unprotected environments
4
A6 Mobile ‘smart’ devices V11. Lack of adequate controls in biometrics' enrollment stage
4
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
4
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
4 stolen and/or copied (expecially for RFID tags)
A6 Mobile ‘smart’ devices V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
4
4
A6 Mobile ‘smart’ devices
4
V31. Devices & equipment used in unprotected environments
A6 Mobile ‘smart’ devices V31. Devices & equipment used in unprotected environments
4
A6 Mobile ‘smart’ devices V31. Devices & equipment used in unprotected environments
4
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
5
A7 Health monitoring devices V24. Inherent features (size, material etc.): easy to lose, to be
5 stolen and/or copied (expecially for RFID tags)
A7 Health monitoring devices V28. Inadequate security measures of data storage (e.g.
5 inadequate encryption measures)
A7 Health monitoring devices V31. Devices & equipment used in unprotected environments
5
A7 Health monitoring devices V31. Devices & equipment used in unprotected environments
5
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
stolen and/or copied (expecially for RFID tags)
3
A8 Travel documents (paper) V24. Inherent features (size, material etc.): easy to lose, to be
3 stolen and/or copied (expecially for RFID tags)
A9 RFID & barcode readers V4. Lack of or low user awareness and/or training in procedures,
use of devices, security aspects etc
4
T22. Malfunctioning/breakdown of
4 4 A1.V14.T22 10
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A1.V2.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A1.V3.T22 10
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A1.V4.T22 10
systems /devices / equipment
T30. Low acceptance of devices /
4 4 A1.V4.T30 9
equipment / procedures
T1. Denial of service attack / Flood /
2 3 A1.V39.T1 7
Buffer overflow
T22. Malfunctioning/breakdown of
4 4 A10.V21.T22 10
systems /devices / equipment
4 T2. Spoofing of credentials / bypass 5 A10.V24.T2 10
authentication
T22. Malfunctioning/breakdown of
3 4 A10.V6.T22 9
systems /devices / equipment
T11. Procedures / instructions not
3 followed 3 A10.V6.T11 7
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A11.V6.T22 8
T22. Malfunctioning/breakdown of
4 4 A12.V32.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A13.V6.T22 9
systems /devices / equipment
T11. Procedures / instructions not
3 3 A13.V6.T11 7
followed
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A13.V8.T22 9
T22. Malfunctioning/breakdown of
4 systems /devices / equipment 4 A14.V9.T22 10
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A14.V10.T22 9
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A15.V3.T22 9
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A17.V13.T22 8
T22. Malfunctioning/breakdown of
4 4 A18.V2.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A18.V3.T22 8
T22. Malfunctioning/breakdown of
2 4 A18.V12.T22 7
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A18.V9.T22 8
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A19.V2.T22 8
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A19.V14.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A2.V14.T22 10
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A2.V3.T22 10
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A2.V6.T22 10
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A20.V2.T22 9
T11. Procedures / instructions not
3 3 A20.V2.T11 7
followed
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A20.V2.T22 9
T22. Malfunctioning/breakdown of
2 4 A20.V10.T22 8
systems /devices / equipment
T22. Malfunctioning/breakdown of
2 systems /devices / equipment 4 A3.V13.T22 7
T22. Malfunctioning/breakdown of
3 4 A3.V12.T22 8
systems /devices / equipment
T22. Malfunctioning/breakdown of
4 4 A3.V6.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A5.V11.T22 9
systems /devices / equipment
T22. Malfunctioning/breakdown of
2 4 A5.V24.T22 8
systems /devices / equipment
T22. Malfunctioning/breakdown of
3 4 A5.V6.T22 9
systems /devices / equipment
T11. Procedures / instructions not
3 3 A5.V6.T11 7
followed
T12. Non-compliance with data
3 4 A5.V6.T12 8
protection legislation
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A5.V12.T22 9
T22. Malfunctioning/breakdown of
3 systems /devices / equipment 4 A6.V10.T22 9
T22. Malfunctioning/breakdown of
4 4 A7.V6.T22 11
systems /devices / equipment
T11. Procedures / instructions not
4 followed 3 A7.V6.T11 9
T22. Malfunctioning/breakdown of
2 systems /devices / equipment 4 A8.V12.T22 7