Source: https://crcom.ac-versailles.fr/IMG/pdf/IBM_Presentation_Gestion_des_risques_informatiques_23102012.pdf