Introduction
»
Raster manual
info@risicotools.nl
version 4.0 – Winter 2023
1
Introduction
1.1
The Raster method
1.1.1
Participants
1.1.2
Tool support
1.2
About this manual
2
The Raster method
2.1
Telecommunication service diagrams
2.1.1
Actors
2.1.2
Wired links
2.1.3
Wireless links
2.1.4
Unknown links
2.1.5
Equipment
2.1.6
Example
3
Stage 1 — Initiation and preparation
3.1
Identify telecom services
3.2
Identify actors and external stakeholders
3.3
Describe disaster scenarios
3.4
Create stage 1 report
3.5
Obtain approval from sponsor
4
Stage 2 — Single failures analysis
4.1
Update the checklists of vulnerabilities
4.2
Draw initial diagrams
4.3
Analyse the vulnerabilities of components
4.3.1
Add and remove vulnerabilities
4.3.2
Assess vulnerabilities
4.3.3
Assess frequency
4.3.4
Assess impact
4.3.5
Assessing all vulnerabilities on a component
4.4
Expand unknown links
4.5
Review
5
Stage 3 — Common cause failures analysis
5.1
Create clusters
5.2
Analyse each cluster
5.3
Expand unknown links
5.4
Review
6
Stage 4 — Risk evaluation
6.1
Determine longlist
6.2
Reduce longlist to shortlist
6.3
Make treatment recommendations
6.3.1
Select risk treatment option
6.3.2
Assess social risk factors
6.3.3
Review the shortlist
6.4
Prepare final report
7
Executing the Raster method
7.1
Team composition
7.2
Stage 1 — Initiation and preparation
7.3
Stage 2 — Single failures analysis
7.3.1
Wireless connections
7.3.2
Wired connections
7.3.3
Equipment
7.4
Stage 3 — Common cause failures analysis
7.4.1
Wireless links
7.4.2
Wired links
7.4.3
Equipment
7.5
Stage 4 — Risk evaluation
8
Raster tools
8.1
Working with the standalone tool
8.1.1
File menu
8.1.2
View menu
8.2
Working with the intranet tool
8.2.1
Private and shared projects
8.3
Toolbars
8.3.1
The Projects toolbar
8.3.2
The Home toolbar
8.3.3
The Settings toolbar
8.4
Printing
8.5
Main views
8.6
Find nodes
8.7
Help window
8.8
Colour codes
8.9
Keyboard shortcuts
9
Diagrams view
9.1
Templates
9.2
Checklist windows
9.3
Service tabs
9.4
The mini-map
9.5
Diagram nodes
9.6
Node classes
9.7
Identical nodes
9.8
Notes
9.9
Connecting nodes
9.10
Selecting nodes
9.11
The node menu
9.12
Node labels
9.13
Vulnerability assessment window
10
Single failures view
10.1
Service tabs
10.2
Vulnerability assessment
11
Common cause failures view
11.1
Vulnerability assessments
11.2
Nodes and node clusters
11.2.1
Nodes
11.2.2
Cluster headers
11.2.3
Drag and drop
12
Analysis view
12.1
Failures and vulnerabilities
12.2
Assessments by level
12.3
Node counts
12.4
Checklist reports
12.5
Longlist
13
Technical issues
13.1
The intranet tool
13.2
Computation of vulnerability levels
13.3
Creating iconsets
13.3.1
Creating icons and masks
13.3.2
iconset.json
13.4
Project Groups
13.4.1
group.json
13.5
Standalone configuration
13.5.1
prefs.json
13.5.2
iconsets
»
Introduction