@@ -1676,17 +1676,17 @@ Risk factors may increase the likelihood of an incident, increase the impact of
The overall risk related to each use case should be considered as a result of combining risk factors affecting both likelihood and impact of an incident.
**[LOC]** Degree of local access to the host system
**[SFT]** Degree of local software access to the host system
Description: How many agents have unprivileged access to the host system.
Description: How many agents have unprivileged software access to the host system.
Rationale: More agents with access on the host increase the likelihood of an attack originating from the host.
Rationale: More agents with software access on the host increase the likelihood of an attack originating from the host.
Type: Affects likelihood of attacks originating from the host system.
***[LOC-L-0]** Foreseeable use is effectively no agents on the host
***[LOC-L-1]** Foreseeable use is trusted agents
***[LOC-L-2]** Foreseeable use includes untrusted agents
***[SFT-L-0]** Foreseeable use is effectively no agents on the host
***[SFT-L-1]** Foreseeable use is trusted agents
***[SFT-L-2]** Foreseeable use includes untrusted agents
**[NET]** Degree of public access to attached network
@@ -1841,7 +1841,7 @@ For the purposes of the list of threats, the product includes:
The risk factors by type are:
Likelihood: LOC NET COM ADM LIS
Likelihood: SFT NET COM ADM LIS
Impact: SYS SDS SDT FUN INT DOS
@@ -1853,9 +1853,9 @@ For each threat, a table shows how to use the risk factors to calculate the leve