Loop 5: Hardware system risk → + network system vulnerability → - data transmission → + data risk → + software failure → + network system vulnerability → + software system risk Loop 6: Hardware system risk → + network system vulnerability → - data transmission → + data risk → + software failure → + database system security → + software system risk Loop 7: Hardware system risk → + network system vulnerability → - data transmission → + data risk → + software failure → + intentional human risk → + human risk→ + software system risk Loop 8: Hardware system risk → + network system vulnerability → + software system risk → + data risk → + software failure → + intentional human risk → + human risk → + environment risk Loop 9: Hardware system risk → + network system vulnerability → - data transmission → + data risk → + software failure → + intentional human risk → + human risk → + environment risk
Figure 3. Casual Loop Diagram of Information Systems Security Risks
The causal loops for software system risk are as follows. Loop 1: Software system risk → + hardware system risk → + network system vulnerability Loop 2: Software system risk → + hardware system risk → + network system vulnerability → - data transmission → + data risk → + software failure → + TCP/IP flaw