Copyright © 2022 the Contributors to the Risk Extension for DPV-SKOS Specification, published by the Data Privacy Vocabularies and Controls Community Group under the W3C Community Contributor License Agreement (CLA). A human-readable summary is available.
Risk concepts extend the Data Privacy Vocabulary (DPV) Specification risk vocabulary to provide additional vocabularies specific to risk management, assessment, controls, and consequences.
The namespace for terms in risk is https://www.w3id.org/dpv/risk#
The suggested prefix for the namespace is risk
The risk vocabulary and its documentation is available on GitHub.
Newcomers to the DPV are strongly recommended to first read through the Primer to familiarise themselves with the semantics and concepts of DPV.
Related Links
The peer-reviewed article “Creating A Vocabulary for Data Privacy” presents a historical overview of the DPVCG, and describes the methodology and structure of the DPV along with describing its creation. An open-access version can be accessed here, here, and here.
This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Contributor License Agreement (CLA) there is a limited opt-out and other conditions apply. Learn more about W3C Community and Business Groups.
This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).
Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.
GitHub Issues are preferred for discussion of this specification.
The DPV-Risk extension https://w3id.org/dpv/risk lists risk assessments, consequences, impacts, methodologies, matrices, etc. But does not refer to other concepts in risk management (criterias, governance, sources, threats, evaluation, etc.) These should be added.
3 Likelihood Levels
|
3 Risk Levels
|
3 Severity Levels
|
5 Likelihood Levels
|
5 Risk Levels
|
5 Severity Levels
|
7 Likelihood Levels
|
7 Risk Levels
|
7 Severity Levels
|
Extremely High Likelihood
|
Extremely High Risk
|
Extremely High Severity
|
Extremely Low Likelihood
|
Extremely Low Risk
|
Extremely Low Severity
|
High Likelihood
|
High Risk
|
High Severity
|
Low Likelihood
|
Low Risk
|
Low Severity
|
Moderate Likelihood
|
Moderate Risk
|
Moderate Severity
|
Very High Likelihood
|
Very High Risk
|
Very High Severity
|
Very Low Likelihood
|
Very Low Risk
|
Very Low Severity
|
IRI | https://w3id.org/dpv/dpv-skos/risk#3LikelihoodLevels |
Term: | 3LikelihoodLevels |
Label: | 3 Likelihood Levels |
Description: | Scale with 3 Likelihood Levels from High to Low |
Narrower than: | dpvs:Likelihood |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#3RiskLevels |
Term: | 3RiskLevels |
Label: | 3 Risk Levels |
Description: | Scale with 3 Risk Levels from High to Low |
Narrower than: | dpvs:RiskLevel |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#3SeverityLevels |
Term: | 3SeverityLevels |
Label: | 3 Severity Levels |
Description: | Scale with 3 Severity Levels from High to Low |
Narrower than: | dpvs:Severity |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#5LikelihoodLevels |
Term: | 5LikelihoodLevels |
Label: | 5 Likelihood Levels |
Description: | Scale with 5 Likelihood Levels from Very High to Very Low |
Narrower than: | dpvs:Likelihood |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#5RiskLevels |
Term: | 5RiskLevels |
Label: | 5 Risk Levels |
Description: | Scale with 5 Risk Levels from Very High to Very Low |
Narrower than: | dpvs:RiskLevel |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#5SeverityLevels |
Term: | 5SeverityLevels |
Label: | 5 Severity Levels |
Description: | Scale with 5 Severity Levels from Very High to Very Low |
Narrower than: | dpvs:Severity |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#7LikelihoodLevels |
Term: | 7LikelihoodLevels |
Label: | 7 Likelihood Levels |
Description: | Scale with 7 Likelihood Levels from Extremely High to Extremely Low |
Narrower than: | dpvs:Likelihood |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#7RiskLevels |
Term: | 7RiskLevels |
Label: | 7 Risk Levels |
Description: | Scale with 7 Risk Levels from Extremely High to Extremely Low |
Narrower than: | dpvs:RiskLevel |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#7SeverityLevels |
Term: | 7SeverityLevels |
Label: | 7 Severity Levels |
Description: | Scale with 7 Severity Levels from Extremely High to Extremely Low |
Narrower than: | dpvs:Severity |
Instance of: | dpvs:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyHighLikelihood |
Term: | ExtremelyHighLikelihood |
Label: | Extremely High Likelihood |
Description: | Level where Likelihood is Extremely High |
Narrower than: | dpvs:Likelihood, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyHighRisk |
Term: | ExtremelyHighRisk |
Label: | Extremely High Risk |
Description: | Level where Risk is Extremely High |
Narrower than: | dpvs:RiskLevel, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyHighSeverity |
Term: | ExtremelyHighSeverity |
Label: | Extremely High Severity |
Description: | Level where Severity is Extremely High |
Narrower than: | dpvs:Severity, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyLowLikelihood |
Term: | ExtremelyLowLikelihood |
Label: | Extremely Low Likelihood |
Description: | Level where Likelihood is Extremely Low |
Narrower than: | dpvs:Likelihood, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyLowRisk |
Term: | ExtremelyLowRisk |
Label: | Extremely Low Risk |
Description: | Level where Risk is Extremely Low |
Narrower than: | dpvs:RiskLevel, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ExtremelyLowSeverity |
Term: | ExtremelyLowSeverity |
Label: | Extremely Low Severity |
Description: | Level where Severity is Extremely Low |
Narrower than: | dpvs:Severity, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HighLikelihood |
Term: | HighLikelihood |
Label: | High Likelihood |
Description: | Level where Likelihood is High |
Narrower than: | dpvs:Likelihood, dpvs-risk:3LikelihoodLevels, dpvs-risk:5LikelihoodLevels, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HighRisk |
Term: | HighRisk |
Label: | High Risk |
Description: | Level where Risk is High |
Narrower than: | dpvs:RiskLevel, dpvs-risk:3RiskLevels, dpvs-risk:5RiskLevels, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HighSeverity |
Term: | HighSeverity |
Label: | High Severity |
Description: | Level where Severity is High |
Narrower than: | dpvs:Severity, dpvs-risk:3SeverityLevels, dpvs-risk:5SeverityLevels, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LowLikelihood |
Term: | LowLikelihood |
Label: | Low Likelihood |
Description: | Level where Likelihood is Low |
Narrower than: | dpvs:Likelihood, dpvs-risk:3LikelihoodLevels, dpvs-risk:5LikelihoodLevels, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LowRisk |
Term: | LowRisk |
Label: | Low Risk |
Description: | Level where Risk is Low |
Narrower than: | dpvs:RiskLevel, dpvs-risk:3RiskLevels, dpvs-risk:5RiskLevels, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LowSeverity |
Term: | LowSeverity |
Label: | Low Severity |
Description: | Level where Severity is Low |
Narrower than: | dpvs:Severity, dpvs-risk:3SeverityLevels, dpvs-risk:5SeverityLevels, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ModerateLikelihood |
Term: | ModerateLikelihood |
Label: | Moderate Likelihood |
Description: | Level where Likelihood is Moderate |
Narrower than: | dpvs:Likelihood, dpvs-risk:3LikelihoodLevels, dpvs-risk:5LikelihoodLevels, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ModerateRisk |
Term: | ModerateRisk |
Label: | Moderate Risk |
Description: | Level where Risk is Moderate |
Narrower than: | dpvs:RiskLevel, dpvs-risk:3RiskLevels, dpvs-risk:5RiskLevels, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ModerateSeverity |
Term: | ModerateSeverity |
Label: | Moderate Severity |
Description: | Level where Severity is Moderate |
Narrower than: | dpvs:Severity, dpvs-risk:3SeverityLevels, dpvs-risk:5SeverityLevels, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryHighLikelihood |
Term: | VeryHighLikelihood |
Label: | Very High Likelihood |
Description: | Level where Likelihood is Very High |
Narrower than: | dpvs:Likelihood, dpvs-risk:5LikelihoodLevels, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryHighRisk |
Term: | VeryHighRisk |
Label: | Very High Risk |
Description: | Level where Risk is Very High |
Narrower than: | dpvs:RiskLevel, dpvs-risk:5RiskLevels, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryHighSeverity |
Term: | VeryHighSeverity |
Label: | Very High Severity |
Description: | Level where Severity is Very High |
Narrower than: | dpvs:Severity, dpvs-risk:5SeverityLevels, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryLowLikelihood |
Term: | VeryLowLikelihood |
Label: | Very Low Likelihood |
Description: | Level where Likelihood is Very Low |
Narrower than: | dpvs:Likelihood, dpvs-risk:5LikelihoodLevels, dpvs-risk:7LikelihoodLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryLowRisk |
Term: | VeryLowRisk |
Label: | Very Low Risk |
Description: | Level where Risk is Very Low |
Narrower than: | dpvs:RiskLevel, dpvs-risk:5RiskLevels, dpvs-risk:7RiskLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VeryLowSeverity |
Term: | VeryLowSeverity |
Label: | Very Low Severity |
Description: | Level where Severity is Very Low |
Narrower than: | dpvs:Severity, dpvs-risk:5SeverityLevels, dpvs-risk:7SeverityLevels |
Instance of: | dpvs:RiskLevel |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Avoid Source
|
Change Consequence
|
Change Impact
|
Control Consequence
|
Control Monitors
|
Control Risk Source
|
Halt Source
|
Monitor Consequence
|
Monitor Impact
|
Monitor Risk
|
Monitor Risk Control
|
Monitor Risk Source
|
Monitor Vulnerabilities
|
Reduce Likelihood
|
Reduce Severity
|
Remove Consequence
|
Remove Impact
|
Remove Source
|
Share Risk
|
IRI | https://w3id.org/dpv/dpv-skos/risk#AvoidSource |
Term: | AvoidSource |
Label: | Avoid Source |
Description: | Risk Control that avoids the risk source |
SubClass of: | dpvs-risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ChangeConsequence |
Term: | ChangeConsequence |
Label: | Change Consequence |
Description: | Risk Control that changes Consequence |
SubClass of: | dpvs-risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ChangeImpact |
Term: | ChangeImpact |
Label: | Change Impact |
Description: | Risk Control that changes Impact |
SubClass of: | dpvs-risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ControlConsequence |
Term: | ControlConsequence |
Label: | Control Consequence |
Description: | Risk Mitigation Measure that controls the Consequences and Impacts |
SubClass of: | dpvs:RiskMitigationMeasure |
SuperType Of: | dpvs-risk:ChangeConsequence, dpvs-risk:ChangeImpact, dpvs-risk:RemoveConsequence, dpvs-risk:RemoveImpact |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ControlMonitors |
Term: | ControlMonitors |
Label: | Control Monitors |
Description: | Risk Mitigation Measure that uses controls to monitor events |
SubClass of: | dpvs:RiskMitigationMeasure |
SuperType Of: | dpvs-risk:MonitorConsequence, dpvs-risk:MonitorImpact, dpvs-risk:MonitorRisk, dpvs-risk:MonitorRiskControl, dpvs-risk:MonitorRiskSource, dpvs-risk:MonitorVulnerabilities |
Note: | Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ControlRiskSource |
Term: | ControlRiskSource |
Label: | Control Risk Source |
Description: | Risk Mitigation Measure that controls the Risk Source |
SubClass of: | dpvs:RiskMitigationMeasure |
SuperType Of: | dpvs-risk:AvoidSource, dpvs-risk:HaltSource, dpvs-risk:RemoveSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HaltSource |
Term: | HaltSource |
Label: | Halt Source |
Description: | Risk Control that halts the risk source or prevents it from materialising |
SubClass of: | dpvs-risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorConsequence |
Term: | MonitorConsequence |
Label: | Monitor Consequence |
Description: | Risk Control that monitors a Risk Consequence |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorImpact |
Term: | MonitorImpact |
Label: | Monitor Impact |
Description: | Risk Control that monitors a Risk Impact |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorRisk |
Term: | MonitorRisk |
Label: | Monitor Risk |
Description: | Risk Control that monitors a Risk |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorRiskControl |
Term: | MonitorRiskControl |
Label: | Monitor Risk Control |
Description: | Risk Control that monitors another Risk Control |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorRiskSource |
Term: | MonitorRiskSource |
Label: | Monitor Risk Source |
Description: | Risk Control that monitors a Risk Source |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonitorVulnerabilities |
Term: | MonitorVulnerabilities |
Label: | Monitor Vulnerabilities |
Description: | Risk Control that monitors a Risk Vulnerability |
SubClass of: | dpvs-risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ReduceLikelihood |
Term: | ReduceLikelihood |
Label: | Reduce Likelihood |
Description: | Risk Control that reduces the likelihood of an event |
SubClass of: | dpvs:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ReduceSeverity |
Term: | ReduceSeverity |
Label: | Reduce Severity |
Description: | Risk Control that reduces the severity of an event |
SubClass of: | dpvs:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RemoveConsequence |
Term: | RemoveConsequence |
Label: | Remove Consequence |
Description: | Risk Control that removes Consequence i.e. prevents it from materialising |
SubClass of: | dpvs-risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RemoveImpact |
Term: | RemoveImpact |
Label: | Remove Impact |
Description: | Risk Control that removes Impact i.e. prevents it from materialising |
SubClass of: | dpvs-risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RemoveSource |
Term: | RemoveSource |
Label: | Remove Source |
Description: | Risk Control that removes the risk source |
SubClass of: | dpvs-risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Abusive Content Utilisation
|
Attack on Private Life
|
Authorisation Failure
|
Blackmail
|
Brute Force Authorisations
|
Business disruption
|
Business impact
|
Business Performance Impairment
|
Child Violence
|
Citizens impact
|
Coercion
|
Compliance impact
|
Compromise Account
|
Compromise Account Credentials
|
Compromise Account Security
|
Confidentiality Breach
|
Consequence for Data Subject
|
Consequence on Data Security
|
Copyright Violation
|
Corruption of Data
|
Cost of Acquisition
|
Cost of Backup
|
Cost of Configuration
|
Cost of Installation
|
Cost of Judicial Penalties
|
Cost of Judicial Proceedings
|
Cost of Operation Interruption
|
Cost of Suspended Operations
|
Cryptojacking
|
Cyber Spying
|
Cyber Stalking
|
Damage by Third Party
|
Danger to Customers
|
Danger to Personnel
|
Data Breach
|
Denial of Service Attack (DoS)
|
Detriment to Recovery
|
Discrimination
|
Distributed Denial of Service Attack (DDoS)
|
Eavesdropping
|
Economic Disadvantage
|
Environmental Safety Endangerment
|
Equipment Failure
|
Equipment Malfunction
|
Errornous System Use
|
Extorsion
|
Financial Equipment Costs
|
Financial Investigation Costs
|
Financial Loss
|
Financial Personnel Costs
|
Financial Repair Costs
|
Fraud
|
Government Crisis
|
Harmful Spech
|
Health and life impact
|
Human Errors
|
Identity Dispute
|
Identity Fraud
|
Identity Theft
|
Illegal Processing of Data
|
Impact on Data Subject
|
Impact to Rights
|
Increase Internal Cost
|
Industrial Crisis
|
Injury
|
Interception of Communications
|
Internal Operation Disruption
|
Known Vulnerability Exploited
|
Law Enforcement Adverse Effects
|
Limitation of Rights
|
Loss of Assets
|
Loss of Competitive Advantage
|
Loss of Control over Data
|
Loss of Credibility
|
Loss of Customer Confidence
|
Loss of Customers
|
Loss of Data
|
Loss of Funds
|
Loss of Goods
|
Loss of Goodwill
|
Loss of Negotiating Capacity
|
Loss of Opportunity
|
Loss of Proprietary Information
|
Loss of Reputation
|
Loss of Resources
|
Loss of Suppliers
|
Loss of Technological Advantage
|
Loss of Trust
|
Malicious Code Attack
|
Malware Attack
|
MisinformationDisinformation
|
Misuse of Breached Information
|
Organisation Disruption
|
Personal Safety Endangerment
|
Personnel Absence
|
Phishing Scam
|
Physical Assault
|
Physical Spying
|
Physical Stalking
|
Prevent Exercising of Rights
|
Privacy impact
|
Psychological Harm
|
Public Order Breach
|
RansomwareAttack
|
Remote Spying
|
Replacement Costs
|
Reputation and trust impact
|
Retrieval of Deleted Data
|
Retrieval of Discarded Equipment
|
Sabotage
|
Scam
|
Security Breach
|
Service Interruption
|
Sexual Violence
|
Social Disadvantage
|
Spam
|
Spoofing
|
Spying
|
Stalking
|
System Failure
|
System Intrusion
|
System Malfunction
|
Terrorism
|
Theft
|
Theft of Equipment
|
Theft of Media
|
Third Party Operation Disruption
|
Unauthorised Access to Premises
|
Unauthorised Code Access
|
Unauthorised Code Disclosure
|
Unauthorised Code Modification
|
Unauthorised Data Access
|
Unauthorised Data Disclosure
|
Unauthorised Data Modification
|
Unauthorised Impersonation
|
Unauthorised Information Disclosure
|
Unauthorised Re-Identification
|
Unauthorised Resource Use
|
Unauthorised System Access
|
Unauthorised System Modification
|
Unknown Vulnerability Exploited
|
Unwanted Code Deletion
|
Unwanted Data Deletion
|
Unwanted Disclosure of Data
|
Vandalism
|
Violation of Code of Conduct
|
Violation of Contractual Obligations
|
Violation of Ethical Code
|
Violation of Rights
|
Violation of Regulatory Obligations
|
Violation of Statutory Obligations
|
Vulnerability Created
|
Vulnerability Exploited
|
IRI | https://w3id.org/dpv/dpv-skos/risk#AbusiveContentUtilisation |
Term: | AbusiveContentUtilisation |
Label: | Abusive Content Utilisation |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#AttackonPrivateLife |
Term: | AttackonPrivateLife |
Label: | Attack on Private Life |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Blackmail |
Term: | Blackmail |
Label: | Blackmail |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Businessdisruption |
Term: | Businessdisruption |
Label: | Business disruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BusinessImpact |
Term: | BusinessImpact |
Label: | Business impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BusinessPerformanceImpairment |
Term: | BusinessPerformanceImpairment |
Label: | Business Performance Impairment |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ChildViolence |
Term: | ChildViolence |
Label: | Child Violence |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CitizensImpact |
Term: | CitizensImpact |
Label: | Citizens impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Coercion |
Term: | Coercion |
Label: | Coercion |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ComplianceImpact |
Term: | ComplianceImpact |
Label: | Compliance impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CompromiseAccount |
Term: | CompromiseAccount |
Label: | Compromise Account |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CompromiseAccountCredentials |
Term: | CompromiseAccountCredentials |
Label: | Compromise Account Credentials |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CompromiseAccountSecurity |
Term: | CompromiseAccountSecurity |
Label: | Compromise Account Security |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ConfidentialityBreach |
Term: | ConfidentialityBreach |
Label: | Confidentiality Breach |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ConsequenceForDataSubject |
Term: | ConsequenceForDataSubject |
Label: | Consequence for Data Subject |
Description: | |
Narrower than: | dpvs:Consequence |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ConsequenceOnDataSecurity |
Term: | ConsequenceOnDataSecurity |
Label: | Consequence on Data Security |
Description: | |
Narrower than: | dpvs:Consequence |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CopyrightViolation |
Term: | CopyrightViolation |
Label: | Copyright Violation |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CorruptionData |
Term: | CorruptionData |
Label: | Corruption of Data |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostAcquisition |
Term: | CostAcquisition |
Label: | Cost of Acquisition |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostBackup |
Term: | CostBackup |
Label: | Cost of Backup |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostConfiguration |
Term: | CostConfiguration |
Label: | Cost of Configuration |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostInstallation |
Term: | CostInstallation |
Label: | Cost of Installation |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostJudicialPenalties |
Term: | CostJudicialPenalties |
Label: | Cost of Judicial Penalties |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostJudicialProceedings |
Term: | CostJudicialProceedings |
Label: | Cost of Judicial Proceedings |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostOperationInterruption |
Term: | CostOperationInterruption |
Label: | Cost of Operation Interruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostSuspendedOperations |
Term: | CostSuspendedOperations |
Label: | Cost of Suspended Operations |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Cryptojacking |
Term: | Cryptojacking |
Label: | Cryptojacking |
Description: | Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Landscape 2021 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CyberSpying |
Term: | CyberSpying |
Label: | Cyber Spying |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CyberStalking |
Term: | CyberStalking |
Label: | Cyber Stalking |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DamageByThirdParty |
Term: | DamageByThirdParty |
Label: | Damage by Third Party |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DangertoCustomers |
Term: | DangertoCustomers |
Label: | Danger to Customers |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DangertoPersonnel |
Term: | DangertoPersonnel |
Label: | Danger to Personnel |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DataBreach |
Term: | DataBreach |
Label: | Data Breach |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DenialServiceAttack |
Term: | DenialServiceAttack |
Label: | Denial of Service Attack (DoS) |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DetrimentToRecovery |
Term: | DetrimentToRecovery |
Label: | Detriment to Recovery |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Discrimination |
Term: | Discrimination |
Label: | Discrimination |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog |
IRI | https://w3id.org/dpv/dpv-skos/risk#DistributedDenialServiceAttack |
Term: | DistributedDenialServiceAttack |
Label: | Distributed Denial of Service Attack (DDoS) |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Eavesdropping |
Term: | Eavesdropping |
Label: | Eavesdropping |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EconomicDisadvantage |
Term: | EconomicDisadvantage |
Label: | Economic Disadvantage |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog |
IRI | https://w3id.org/dpv/dpv-skos/risk#EnvironmentalSafetyEndangerment |
Term: | EnvironmentalSafetyEndangerment |
Label: | Environmental Safety Endangerment |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EquipmentFailure |
Term: | EquipmentFailure |
Label: | Equipment Failure |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EquipmentMalfunction |
Term: | EquipmentMalfunction |
Label: | Equipment Malfunction |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ErrornousSystemUse |
Term: | ErrornousSystemUse |
Label: | Errornous System Use |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Extorsion |
Term: | Extorsion |
Label: | Extorsion |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FinancialEquipmentCosts |
Term: | FinancialEquipmentCosts |
Label: | Financial Equipment Costs |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FinancialInvestigationCosts |
Term: | FinancialInvestigationCosts |
Label: | Financial Investigation Costs |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FinancialLoss |
Term: | FinancialLoss |
Label: | Financial Loss |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FinancialPersonnelCosts |
Term: | FinancialPersonnelCosts |
Label: | Financial Personnel Costs |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FinancialRepairCosts |
Term: | FinancialRepairCosts |
Label: | Financial Repair Costs |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Fraud |
Term: | Fraud |
Label: | Fraud |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#GovernmentCrisis |
Term: | GovernmentCrisis |
Label: | Government Crisis |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HarmfulSpeech |
Term: | HarmfulSpeech |
Label: | Harmful Spech |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HealthLifeImpact |
Term: | HealthLifeImpact |
Label: | Health and life impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HumanErrors |
Term: | HumanErrors |
Label: | Human Errors |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IdentityDispute |
Term: | IdentityDispute |
Label: | Identity Dispute |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IdentityFraud |
Term: | IdentityFraud |
Label: | Identity Fraud |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IdentityTheft |
Term: | IdentityTheft |
Label: | Identity Theft |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IllegalProcessingData |
Term: | IllegalProcessingData |
Label: | Illegal Processing of Data |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ImpactOnDataSubject |
Term: | ImpactOnDataSubject |
Label: | Impact on Data Subject |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ImpacttoRights |
Term: | ImpacttoRights |
Label: | Impact to Rights |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IncreaseInternalCost |
Term: | IncreaseInternalCost |
Label: | Increase Internal Cost |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IndustrialCrisis |
Term: | IndustrialCrisis |
Label: | Industrial Crisis |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Injury |
Term: | Injury |
Label: | Injury |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#InterceptionCommunications |
Term: | InterceptionCommunications |
Label: | Interception of Communications |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#InternalOperationDisruption |
Term: | InternalOperationDisruption |
Label: | Internal Operation Disruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#KnownVulnerabilityExploited |
Term: | KnownVulnerabilityExploited |
Label: | Known Vulnerability Exploited |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LawEnforcementAdverseEffects |
Term: | LawEnforcementAdverseEffects |
Label: | Law Enforcement Adverse Effects |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LimitationOfRights |
Term: | LimitationOfRights |
Label: | Limitation of Rights |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossAssets |
Term: | LossAssets |
Label: | Loss of Assets |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossCompetitiveAdvantage |
Term: | LossCompetitiveAdvantage |
Label: | Loss of Competitive Advantage |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossControlOverData |
Term: | LossControlOverData |
Label: | Loss of Control over Data |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossCredibility |
Term: | LossCredibility |
Label: | Loss of Credibility |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossCustomerConfidence |
Term: | LossCustomerConfidence |
Label: | Loss of Customer Confidence |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossCustomers |
Term: | LossCustomers |
Label: | Loss of Customers |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossData |
Term: | LossData |
Label: | Loss of Data |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossFunds |
Term: | LossFunds |
Label: | Loss of Funds |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossGoods |
Term: | LossGoods |
Label: | Loss of Goods |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossGoodwill |
Term: | LossGoodwill |
Label: | Loss of Goodwill |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossNegotiatingCapacity |
Term: | LossNegotiatingCapacity |
Label: | Loss of Negotiating Capacity |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossOpportunity |
Term: | LossOpportunity |
Label: | Loss of Opportunity |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossProprietaryInformation |
Term: | LossProprietaryInformation |
Label: | Loss of Proprietary Information |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossReputation |
Term: | LossReputation |
Label: | Loss of Reputation |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossResources |
Term: | LossResources |
Label: | Loss of Resources |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossSuppliers |
Term: | LossSuppliers |
Label: | Loss of Suppliers |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossTechnologicalAdvantage |
Term: | LossTechnologicalAdvantage |
Label: | Loss of Technological Advantage |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LossTrust |
Term: | LossTrust |
Label: | Loss of Trust |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MaliciousCodeAttack |
Term: | MaliciousCodeAttack |
Label: | Malicious Code Attack |
Description: | Intentional use of software by including or inserting in a system for a harmful purpose |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MalwareAttack |
Term: | MalwareAttack |
Label: | Malware Attack |
Description: | Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MisinformationDisinformation |
Term: | MisinformationDisinformation |
Label: | MisinformationDisinformation |
Description: | Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Landscape 2021 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MisuseBreachedInformation |
Term: | MisuseBreachedInformation |
Label: | Misuse of Breached Information |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#OrganisationDisruption |
Term: | OrganisationDisruption |
Label: | Organisation Disruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PersonalSafetyEndangerment |
Term: | PersonalSafetyEndangerment |
Label: | Personal Safety Endangerment |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PersonnelAbsence |
Term: | PersonnelAbsence |
Label: | Personnel Absence |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PhishingScam |
Term: | PhishingScam |
Label: | Phishing Scam |
Description: | A type of social engineering attack involving deceptive messages intended to reveal sensitive information |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PhysicalAssault |
Term: | PhysicalAssault |
Label: | Physical Assault |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PhysicalSpying |
Term: | PhysicalSpying |
Label: | Physical Spying |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PhysicalStalking |
Term: | PhysicalStalking |
Label: | Physical Stalking |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PreventExercisingOfRights |
Term: | PreventExercisingOfRights |
Label: | Prevent Exercising of Rights |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PrivacyImpact |
Term: | PrivacyImpact |
Label: | Privacy impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PsychologicalHarm |
Term: | PsychologicalHarm |
Label: | Psychological Harm |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PublicOrderBreach |
Term: | PublicOrderBreach |
Label: | Public Order Breach |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RansomwareAttack |
Term: | RansomwareAttack |
Label: | RansomwareAttack |
Description: | Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RemoteSpying |
Term: | RemoteSpying |
Label: | Remote Spying |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ReplacementCosts |
Term: | ReplacementCosts |
Label: | Replacement Costs |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ReputationTrustImpact |
Term: | ReputationTrustImpact |
Label: | Reputation and trust impact |
Description: | |
Narrower than: | dpvs:Impact |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RetrievalDeletedData |
Term: | RetrievalDeletedData |
Label: | Retrieval of Deleted Data |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RetrievalDiscardedEquipment |
Term: | RetrievalDiscardedEquipment |
Label: | Retrieval of Discarded Equipment |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Sabotage |
Term: | Sabotage |
Label: | Sabotage |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Scam |
Term: | Scam |
Label: | Scam |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SecurityBreach |
Term: | SecurityBreach |
Label: | Security Breach |
Description: | |
Narrower than: | dpvs:Consequence |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ServiceInterruption |
Term: | ServiceInterruption |
Label: | Service Interruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SexualViolence |
Term: | SexualViolence |
Label: | Sexual Violence |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Spam |
Term: | Spam |
Label: | Spam |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Spoofing |
Term: | Spoofing |
Label: | Spoofing |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Spying |
Term: | Spying |
Label: | Spying |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Stalking |
Term: | Stalking |
Label: | Stalking |
Description: | |
Narrower than: | dpvs:NonMaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SystemFailure |
Term: | SystemFailure |
Label: | System Failure |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SystemIntrusion |
Term: | SystemIntrusion |
Label: | System Intrusion |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SystemMalfunction |
Term: | SystemMalfunction |
Label: | System Malfunction |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Terrorism |
Term: | Terrorism |
Label: | Terrorism |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Theft |
Term: | Theft |
Label: | Theft |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#TheftEquipment |
Term: | TheftEquipment |
Label: | Theft of Equipment |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#TheftMedia |
Term: | TheftMedia |
Label: | Theft of Media |
Description: | |
Narrower than: | dpvs:MaterialDamage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ThirdPartyOperationDisruption |
Term: | ThirdPartyOperationDisruption |
Label: | Third Party Operation Disruption |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#UnknownVulnerabilityExploited |
Term: | UnknownVulnerabilityExploited |
Label: | Unknown Vulnerability Exploited |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#UnwantedCodeDeletion |
Term: | UnwantedCodeDeletion |
Label: | Unwanted Code Deletion |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#UnwantedDataDeletion |
Term: | UnwantedDataDeletion |
Label: | Unwanted Data Deletion |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#UnwantedDisclosureData |
Term: | UnwantedDisclosureData |
Label: | Unwanted Disclosure of Data |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Vandalism |
Term: | Vandalism |
Label: | Vandalism |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationCodeConduct |
Term: | ViolationCodeConduct |
Label: | Violation of Code of Conduct |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationContractualObligations |
Term: | ViolationContractualObligations |
Label: | Violation of Contractual Obligations |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationEthicalCode |
Term: | ViolationEthicalCode |
Label: | Violation of Ethical Code |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationOfRights |
Term: | ViolationOfRights |
Label: | Violation of Rights |
Description: | |
Narrower than: | dpvs:Harm |
Instance of: | dpvs:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationRegulatoryObligations |
Term: | ViolationRegulatoryObligations |
Label: | Violation of Regulatory Obligations |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ViolationStatutoryObligations |
Term: | ViolationStatutoryObligations |
Label: | Violation of Statutory Obligations |
Description: | |
Narrower than: | dpvs:Damage |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VulnerabilityCreated |
Term: | VulnerabilityCreated |
Label: | Vulnerability Created |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VulnerabilityExploited |
Term: | VulnerabilityExploited |
Label: | Vulnerability Exploited |
Description: | |
Narrower than: | dpvs:Detriment |
Instance of: | dpvs:Consequence |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
ALARA
|
ALARP
|
Bayesian Analysis
|
Bayesian Networks
|
Bow Tie Analysis
|
Brainstorming
|
Business Impact Analysis
|
Causal Mapping
|
Cause-Consequence Analysis
|
Checklists
|
Cindynic Approach
|
Classifications
|
Cost/benefit Analysis
|
Cross Impact Analysis
|
Conditional Value at Risk (CVaR)
|
Decision Tree Analysis
|
Delphi Technique
|
Data Protection Impact Assessment (DPIA)
|
Event Tree Analysis
|
Fault Tree Analysis
|
Ishikawa (Fishbone)
|
Failure Modes And Effects Analysis (FMEA)
|
Failure Modes And Effects And Criticality Analysis (FMECA)
|
F-N Diagrams
|
Game Theory
|
Hazard Analysis And Critical Control Points (HACCP)
|
Hazard And Operability Studies (HAZOP)
|
Human Reliability Analysis
|
Influence Diagrams
|
Interviews
|
Layer Protection Analysis (LOPA)
|
Markov Analysis
|
Multi-criteria Analysis (MCA)
|
Monte Carlo Simulation
|
Nominal Group Technique
|
Pareto Charts
|
Privacy Impact Analysis (PIA)
|
Qualitative Risk Assessment Technique
|
Quantitative Risk Assessment Technique
|
Reliability Centred Maintenance
|
Risk Assessment Technique
|
Risk Indices
|
Risk Matrix
|
Risk Registers
|
Scenario Analysis
|
S-curves
|
SFAIRP
|
Surveys
|
Structured "What If?" (SWIFT)
|
Taxonomies
|
Toxicological Risk Assessment
|
Value At Risk (VaR)
|
IRI | https://w3id.org/dpv/dpv-skos/risk#ALARA |
Term: | ALARA |
Label: | ALARA |
Description: | As Low as Resonably Achievable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ALARP |
Term: | ALARP |
Label: | ALARP |
Description: | As Low as Resonably Possible (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BayesianAnalysis |
Term: | BayesianAnalysis |
Label: | Bayesian Analysis |
Description: | A means of making inference about model parameters using Bayes' theorem which has the capability of incorporating empirical data into prior judgements about probabilities |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BayesianNetworks |
Term: | BayesianNetworks |
Label: | Bayesian Networks |
Description: | A graphical model of variables and their cause-effect relationships expressed using probabilities |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BowTie |
Term: | BowTie |
Label: | Bow Tie Analysis |
Description: | A diagrammatic way of describing the pathways from sources of risk to outcomes, and of reviewing controls |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Brainstorming |
Term: | Brainstorming |
Label: | Brainstorming |
Description: | Technique used in workshops to encourage imaginative thinking |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BusinessImpactAnalysis |
Term: | BusinessImpactAnalysis |
Label: | Business Impact Analysis |
Description: | A process that analyses the consequences of a disruptive incident on the organization which determines the recovery priorities of an organization's products and services and, thereby, the priorities of the activities and resources which deliver them |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CausalMapping |
Term: | CausalMapping |
Label: | Causal Mapping |
Description: | A network diagram representing events, causes and effects and their relationships. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CauseConsequenceAnalysis |
Term: | CauseConsequenceAnalysis |
Label: | Cause-Consequence Analysis |
Description: | A combination of fault and event tree analysis that allows inclusion of time delays. Both causes and consequences of an initiating event are considered. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Checklists |
Term: | Checklists |
Label: | Checklists |
Description: | A checklist based on experience or on concepts and models that can be used to help identify risks or controls. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Cindynic |
Term: | Cindynic |
Label: | Cindynic Approach |
Description: | Considers goals, values, rules, data and models of stakeholders and identifies inconsistencies, ambiguities, omissions and ignorance. These form systemic sources and drivers of risk. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Classifications |
Term: | Classifications |
Label: | Classifications |
Description: | A classification list based on experience or on concepts and models that can be used to help identify risks or controls. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CostBenefitAnalysis |
Term: | CostBenefitAnalysis |
Label: | Cost/benefit Analysis |
Description: | Uses money as a scale for estimating positive and negative, tangible and intangible, consequences of different options. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CrossImpactAnalysis |
Term: | CrossImpactAnalysis |
Label: | Cross Impact Analysis |
Description: | Evaluates changes in the probability of the occurrence of a given set of events consequent on the actual occurrence of one of them. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CVaR |
Term: | CVaR |
Label: | Conditional Value at Risk (CVaR) |
Description: | A measure of the expected loss from a financial portfolio in the worst a % of cases. Also called expected shortfall (ES) |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DecisionTreeAnalysis |
Term: | DecisionTreeAnalysis |
Label: | Decision Tree Analysis |
Description: | Uses a tree-like representation or model of decisions and their possible consequences. Outcomes are usually expressed in monetary terms or in terms of utility. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DelphiTechnique |
Term: | DelphiTechnique |
Label: | Delphi Technique |
Description: | Collects judgements through a set of sequential questionnaires. People participate individually but receive feedback on the responses of others after each set of questions. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#DPIA |
Term: | DPIA |
Label: | Data Protection Impact Assessment (DPIA) |
Description: | Analyses how incidents and events could affect the protection of data and its effects on persons and identifies and quantifies the capabilities that would be needed to manage it. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EventTreeAnalysis |
Term: | EventTreeAnalysis |
Label: | Event Tree Analysis |
Description: | Models the possible outcomes from a given initiating event and the status of controls thus analysing the frequency or probability of the various possible outcomes. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FaultTreeAnalysis |
Term: | FaultTreeAnalysis |
Label: | Fault Tree Analysis |
Description: | Analyses causes of a focus event using Boolean logic to describe combinations of faults. Variations include a success tree where the top event is desired and a cause tree used to investigate past events. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Fishbone |
Term: | Fishbone |
Label: | Ishikawa (Fishbone) |
Description: | Identifies contributory factors to a defined outcome (wanted or unwanted). Contributory factors are usually divided into predefined categories and displayed in a tree structure or a fishbone diagram. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FMEA |
Term: | FMEA |
Label: | Failure Modes And Effects Analysis (FMEA) |
Description: | Considers the ways in which each component of a system might fail and the failure causes and effects. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FMECA |
Term: | FMECA |
Label: | Failure Modes And Effects And Criticality Analysis (FMECA) |
Description: | Considers the ways in which each component of a system might fail and the failure causes and effects. FMEA followed by a criticality analysis which defines the significance of each failure mode (FMECA). |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FNDiagrams |
Term: | FNDiagrams |
Label: | F-N Diagrams |
Description: | Special case of quantitative consequence/likelihood graph applied to consideration of tolerability of risk to human life. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#GameTheory |
Term: | GameTheory |
Label: | Game Theory |
Description: | The study of strategic decision making to model the impact of the decisions of different players involved in the game. Example application area can be risk based pricing. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HACCP |
Term: | HACCP |
Label: | Hazard Analysis And Critical Control Points (HACCP) |
Description: | Analyses the risk reduction that can be achieved by various layers of protection. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HAZOP |
Term: | HAZOP |
Label: | Hazard And Operability Studies (HAZOP) |
Description: | A structured and systematic examination of a planned or existing process or operation in order to identify and evaluate problems that might represent risk to personnel or equipment, or prevent efficient operation |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HumanReliabilityAnalysis |
Term: | HumanReliabilityAnalysis |
Label: | Human Reliability Analysis |
Description: | A set of techniques for identifying the potential for human error and estimating the likelihood of failure. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#InfluenceDiagrams |
Term: | InfluenceDiagrams |
Label: | Influence Diagrams |
Description: | An extended version of Bayesian networks that includes variables representing uncertainties, consequences and actions |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Interviews |
Term: | Interviews |
Label: | Interviews |
Description: | Structured or semi- structured one-to-one conversations to elicit views. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#LOPA |
Term: | LOPA |
Label: | Layer Protection Analysis (LOPA) |
Description: | Analyses the risk reduction that can be achieved by various layers of protection. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MarkovAnalysis |
Term: | MarkovAnalysis |
Label: | Markov Analysis |
Description: | Calculates the probability that a system that has the capacity to be in one of a number of states will be in a particular state at a time t in the future. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MCA |
Term: | MCA |
Label: | Multi-criteria Analysis (MCA) |
Description: | Compares options in a way that makes trade-offs explicit. Provides an alternative to cost/benefit analysis that does not need a monetary value to be allocated to all inputs. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MonteCarloSimulation |
Term: | MonteCarloSimulation |
Label: | Monte Carlo Simulation |
Description: | Calculates the probability of outcomes by running multiple simulations using random variables. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#NominalGroupTechnique |
Term: | NominalGroupTechnique |
Label: | Nominal Group Technique |
Description: | Technique for eliciting views from a group of people where initial participation is as individuals with no interaction, then group discussion of ideas follows. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ParetoCharts |
Term: | ParetoCharts |
Label: | Pareto Charts |
Description: | The Pareto principle (the 80–20 rule) states that, for many events, roughly 80 % of the effects come from 20 % of the causes. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#PIA |
Term: | PIA |
Label: | Privacy Impact Analysis (PIA) |
Description: | Analyses how incidents and events could affect a person's privacy and identifies and quantifies the capabilities that would be needed to manage it. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#QualitativeRiskAssessmentTechnique |
Term: | QualitativeRiskAssessmentTechnique |
Label: | Qualitative Risk Assessment Technique |
Description: | A risk assessment technique that uses qualitative methods |
Narrower than: | dpvs-risk:RiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#QuantitativeRiskAssessmentTechnique |
Term: | QuantitativeRiskAssessmentTechnique |
Label: | Quantitative Risk Assessment Technique |
Description: | A risk assessment technique that uses quantitative methods |
Narrower than: | dpvs-risk:RiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ReliabilityCentredMaintenance |
Term: | ReliabilityCentredMaintenance |
Label: | Reliability Centred Maintenance |
Description: | A risk based assessment used to identify the appropriate maintenance tasks for a system and its components. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskAssessmentTechnique |
Term: | RiskAssessmentTechnique |
Label: | Risk Assessment Technique |
Description: | A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures |
Narrower than: | dpvs:RiskManagementProcedure |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskIndices |
Term: | RiskIndices |
Label: | Risk Indices |
Description: | Rates the significance of risks based on ratings applied to factors which are believed to influence the magnitude of the risk. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskMatrix |
Term: | RiskMatrix |
Label: | Risk Matrix |
Description: | Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
SuperType Of: | dpvs-risk:RiskMatrix3x3, dpvs-risk:RiskMatrix5x5, dpvs-risk:RiskMatrix7x7 |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskRegisters |
Term: | RiskRegisters |
Label: | Risk Registers |
Description: | A means of recording information about risks and tracking actions. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ScenarioAnalysis |
Term: | ScenarioAnalysis |
Label: | Scenario Analysis |
Description: | Identifies possible future scenarios through imagination, extrapolation from the present or modelling. Risk is then considered for each of these scenarios. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SCurves |
Term: | SCurves |
Label: | S-curves |
Description: | A means of displaying the relationship between consequences and their likelihood plotted as a cumulative distribution function (S-curve). |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SFAIRP |
Term: | SFAIRP |
Label: | SFAIRP |
Description: | So far as is Resonably Practiceable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique, dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Surveys |
Term: | Surveys |
Label: | Surveys |
Description: | Paper- or computer-based questionnaires to elicit views. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#SWIFT |
Term: | SWIFT |
Label: | Structured "What If?" (SWIFT) |
Description: | A simpler form of HAZOP with prompts of "what if" to identify deviations from the expected. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Taxonomies |
Term: | Taxonomies |
Label: | Taxonomies |
Description: | A taxonomy based on experience or on concepts and models that can be used to help identify risks or controls. |
Narrower than: | dpvs-risk:QualitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#Toxicological |
Term: | Toxicological |
Label: | Toxicological Risk Assessment |
Description: | A series of steps taken to obtain a measure for the risk to humans or ecological systems due to exposure to chemicals. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#VaR |
Term: | VaR |
Label: | Value At Risk (VaR) |
Description: | Financial measure of risk that uses an assumed probability distribution of losses in a stable market condition to calculate the value of a loss that might occur with a specified probability within a defined time span. |
Narrower than: | dpvs-risk:QuantitativeRiskAssessmentTechnique |
Instance of: | dpvs-risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
ACSC-ISM
|
ANSI/ISA-62443-3‑2-2020
|
BSI Standard 200-2
|
CCRACII
|
CORAS
|
CRAMM
|
EBIOS
|
ERM-IF
|
ETSI TS 102 165-1
|
ITSRM²
|
FAIR
|
FAIR Privacy
|
GCSOS
|
HITRUST-CSF
|
IMO MSC-FAL.1/CIRC.3
|
IRAM2
|
IS-BM
|
ISACA-RISK-IT
|
ISAMM
|
ISO/IEC 27005:2018
|
ISRAM
|
IT-Grundschutz
|
MAGERIT
|
MEHARI
|
MONARC
|
NIST SP 800-30
|
NIST SP 800-37
|
NIST SP 800–39
|
NIST SP 800–82
|
O-RA
|
OCTAVE
|
OCTAVE ALLEGRO
|
OCTAVE FORTE
|
OCTAVE-S
|
Risk Management Methodology
|
IRI | https://w3id.org/dpv/dpv-skos/risk#ACSC-ISM |
Term: | ACSC-ISM |
Label: | ACSC-ISM |
Description: | The Australian Cyber Security Centre (ACSC) published the Australian Government Information Security Manual (ISM) which adopts the use of a risk management framework that draws from NIST 800-37, and includes six steps: define the system, select security controls, implement security controls, assess security controls, authorise the system and monitor the system |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ANSI-ISA-62443-3‑2-2020 |
Term: | ANSI-ISA-62443-3‑2-2020 |
Label: | ANSI/ISA-62443-3‑2-2020 |
Description: | ANSI/ISA-62443-3-2-2020 standard, entitled ‘Security for industrial automation and control systems, Part 3-2: Security risk assessment for system design’, from the International Society of Automation (ISA), dedicates an entire part to the assessment of security risk for system design targeting Security and IT professionals |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#BSI-200-2 |
Term: | BSI-200-2 |
Label: | BSI Standard 200-2 |
Description: | The BSI-Standard 200-2 (‘IT-Grundschutz Methodology’) provides a methodology for the management of information security which can be adapted to the requirements of organisations of various types and sizes |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CCRACII |
Term: | CCRACII |
Label: | CCRACII |
Description: | The Guide to Conducting Cybersecurity Risk Assessment for Critical Information Infrastructure (CCRACII) defines commonly used terms such as threat event, vulnerability, likelihood, impact and risk, roles, and responsibilities, in addition to a range for risk levels, ranging from low to very high with different level of risk toleranc |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CORAS |
Term: | CORAS |
Label: | CORAS |
Description: | The CORAS method was developed and is supported by SourceForge. It is a method for conducting the analysis and management of security risk. It provides a customised language for modelling threats and risks as well as detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of the security analysis |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#CRAMM |
Term: | CRAMM |
Label: | CRAMM |
Description: | CCTA Risk Assessment and Management Methodology (CRAMM) is a method that an analyst or group of analysts may use to evaluate the security and risk level of an organisation by analysing and combining the diverse knowledge distributed in the local corporate environment |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EBIOS |
Term: | EBIOS |
Label: | EBIOS |
Description: | Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS) Risk Manager is an information security risk management method, created under the French General Secretariat of National Defence, consistent with ISO 31000 and ISO/IEC 27005, and enables the risk management requirements of ISO/IEC 27001 to be met |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ERM-IF |
Term: | ERM-IF |
Label: | ERM-IF |
Description: | Enterprise Risk Management - Integrated Framework (ERM-IF) defines the essential components of enterprise risk management. It is based on a set of principles and concepts for the enterprise and has as its objective to offer a common language for enterprise risk |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ETSI-TS-102-165-1 |
Term: | ETSI-TS-102-165-1 |
Label: | ETSI TS 102 165-1 |
Description: | ETSI TS 102 165-1 offers methodology and pro-forma for threat, vulnerability and risk analysis (TVRA). According to ETSI TS 102 165-1, threat vulnerability and risk analysis (TVRA) is used to identify risk to an information system based upon the product of the likelihood of an attack and the impact that such an attack will have on the system |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#EU-ITSRM |
Term: | EU-ITSRM |
Label: | ITSRM² |
Description: | ITSRM² IT Security Risk Management Methodology is a methodology provided by DG DIGIT and the European Commission as part of a set of standards for information security |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FAIR |
Term: | FAIR |
Label: | FAIR |
Description: | The purpose of the FAIR (Factor Analysis of Information Risk) model is to help organisations understand, analyse, and measure information risk. The model provides an approach to quantify risk and defines the necessary building blocks for implementing effective cyber risk management programmes |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#FAIR-Privacy |
Term: | FAIR-Privacy |
Label: | FAIR Privacy |
Description: | Factors Analysis in Information Risk (FAIR Privacy) is a quantitative privacy risk framework based on FAIR (Factors Analysis in Information Risk) that examines personal privacy risks (to individuals), not organisational risks |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#GCSOS |
Term: | GCSOS |
Label: | GCSOS |
Description: | The Guidelines on Cyber Security Onboard Ships (GCSOS) guidelines explain why and how cyber risks should be managed in a shipping context. They outline the risk assessment process with an explanation of the part played by each component of cyber risk and offer advice on how to respond to and recover from cyber incidents |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#HITRUST-CSF |
Term: | HITRUST-CSF |
Label: | HITRUST-CSF |
Description: | The HITRUST Cyber-Security Framework (CSF) is a framework created by security industry experts to safeguard sensitive information and manage information risk for organisations across all industries and throughout the third-party supply chain |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IMO-MSC-FAL1-CIRC3 |
Term: | IMO-MSC-FAL1-CIRC3 |
Label: | IMO MSC-FAL.1/CIRC.3 |
Description: | The official International Maritime Organization guidelines IMO MSC-FAL.1/CIRC.3 provide a high-level approach to the management pf maritime cyber risk which refers to the extent a technology asset is exposed to risks during an event that could result in shipping-related operational failure |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IRAM2 |
Term: | IRAM2 |
Label: | IRAM2 |
Description: | Information Risk Assessment Methodology (IRAM2) supports risk assessment and treatment and entails a six-phase process, and is is implemented by an automated toolset |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IS-BM |
Term: | IS-BM |
Label: | IS-BM |
Description: | The IS risk analysis method is based on a business model using a quantitative approach. The values of IS assets come from their importance towards operational continuity, as well as from their replacement costs |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ISACA-RISK-IT |
Term: | ISACA-RISK-IT |
Label: | ISACA-RISK-IT |
Description: | The ISACA Risk IT Framework provides a set of guiding principles and supporting practices for enterprise management, combined to deliver a comprehensive process model for governing and managing IT risk |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ISAMM |
Term: | ISAMM |
Label: | ISAMM |
Description: | Information Security Assessment and Monitoring Method (ISAMM) is a quantitative type of risk management methodology that can be applied by various organisations such as governmental agencies, large companies and small and medium size enterprises |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ISO-IEC-27005-2018 |
Term: | ISO-IEC-27005-2018 |
Label: | ISO/IEC 27005:2018 |
Description: | ISO/IEC 27005:2018 ‘Information technology — Security techniques — Information security risk management’ is a risk management framework applicable to all types of organisations (e.g. commercial enterprises, government agencies, non-profit organisations) which intend to manage risks that could compromise the organisation’s information security |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#ISRAM |
Term: | ISRAM |
Label: | ISRAM |
Description: | ISRAM is a quantitative, paper-based risk analysis method that is designed to allow effective participation of managers and staff in the process |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#IT-Grundschutz |
Term: | IT-Grundschutz |
Label: | IT-Grundschutz |
Description: | IT-Grundschutz has been developed by the Federal Office for Information Security in Germany. IT-Grundschutz provides a configuration for the establishment of an integrated and effective IT security managemen |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MAGERIT |
Term: | MAGERIT |
Label: | MAGERIT |
Description: | Method for the Harmonised Analysis of Risk (MAGERIT) is an open methodology for risk analysis and management developed by the Spanish Higher Council for Electronic Government and offered as a framework and guide to the public administration |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MEHARI |
Term: | MEHARI |
Label: | MEHARI |
Description: | MEHARI is a free of charge qualitative risk analysis and management method developed by CLUSIF (Club for the Security of Information in France/Club de la Sécurité de l'Information Français) |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#MONARC |
Term: | MONARC |
Label: | MONARC |
Description: | MONARC (Méthode Optimisée d’analyse des risques CASES – ‘Method for an Optimised Analysis of Risks by CASES’ is a tool and a method allowing precise and repeatable risk assessments to take place |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#NIST-SP-800-30 |
Term: | NIST-SP-800-30 |
Label: | NIST SP 800-30 |
Description: | NIST 800-30 is a free guide that provides a foundation for the development of an effective risk management programme, containing both the definitions and the practical guidance necessary for assessing and mitigating risks identified within IT systems |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#NIST-SP-800-37 |
Term: | NIST-SP-800-37 |
Label: | NIST SP 800-37 |
Description: | NIST SP 800-37 Rev. 2 is an asset-based RMF which comprises 7 steps, namely Prepare, Categorise, Select, Implement, Assess, Authorise and Monitor. It does not adopt a specific risk assessment methodology, although the NIST 800-30 guide is extensively referenced |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#NIST-SP-800-39 |
Term: | NIST-SP-800-39 |
Label: | NIST SP 800–39 |
Description: | The purpose of NIST SP 800-39 is to provide a structured, yet flexible approach for an integrated, enterprise-wide programme for managing the risk to information security of organisational operations (i.e. mission, functions, image, and reputation) and assets, individuals, other organisations etc. on an ongoing basis |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#NIST-SP-800-82 |
Term: | NIST-SP-800-82 |
Label: | NIST SP 800–82 |
Description: | NIST SP 800-82 Rev. 2 (Stouffer, et al., 2015), entitled ‘Guide to industrial control systems (ISC) security’, is an Industrial Control Systems Security Guide |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#O-RA |
Term: | O-RA |
Label: | O-RA |
Description: | The Open Group Standard for Risk Analysis (O-RA) provides a set of standards for various aspects of information security risk analysis that is based on the Open FAIR framework and can be applied to any risk scenario |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#OCTAVE |
Term: | OCTAVE |
Label: | OCTAVE |
Description: | Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a free of charge approach to evaluations of information security risk that is comprehensive, systematic, context-driven, and self-directed |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#OCTAVE-ALLEGRO |
Term: | OCTAVE-ALLEGRO |
Label: | OCTAVE ALLEGRO |
Description: | OCTAVE Allegro is designed to allow broad assessment of an organisation’s operational risk environment, with the goal of producing robust results without the need for extensive knowledge of risk assessment |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#OCTAVE-FORTE |
Term: | OCTAVE-FORTE |
Label: | OCTAVE FORTE |
Description: | The OCTAVE FORTE process model was developed to support organisations in evaluating their security risks. It applies Enterprise Risk Management (ERM) principles to bridge the gap between executives and practitioners acting as decision makers |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#OCTAVE-S |
Term: | OCTAVE-S |
Label: | OCTAVE-S |
Description: | The OCTAVE-S is based on the OCTAVE approach and is a self-directed approach, meaning that people from an organisation assume responsibility for setting the organisation’s security strategy |
Narrower than: | dpvs-risk:RiskManagementMethodology |
Instance of: | dpvs-risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskManagementMethodology |
Term: | RiskManagementMethodology |
Label: | Risk Management Methodology |
Description: | A risk management framework or methodology addresses the main functional components related to identification, assessment, treatment, and monitoring regarding risks |
Narrower than: | dpvs:RiskManagementProcedure |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Risk Matrix 3x3
|
Risk Matrix 5x5
|
Risk Matrix 7x7
|
Low Risk (RM3x3 S:1 L:1)
|
Low Risk (RM3x3 S:1 L:2)
|
Moderate Risk (RM3x3 S:1 L:3)
|
Low Risk (RM3x3 S:2 L:1)
|
Moderate Risk (RM3x3 S:2 L:2)
|
High Risk (RM3x3 S:2 L:3)
|
Moderate Risk (RM3x3 S:3 L:1)
|
High Risk (RM3x3 S:3 L:2)
|
High Risk (RM3x3 S:3 L:3)
|
Very Low Risk (RM5x5 S:1 L:1)
|
Very Low Risk (RM5x5 S:1 L:2)
|
Very Low Risk (RM5x5 S:1 L:3)
|
Low Risk (RM5x5 S:1 L:4)
|
Low Risk (RM5x5 S:1 L:5)
|
Very Low Risk (RM5x5 S:2 L:1)
|
Low Risk (RM5x5 S:2 L:2)
|
Moderate Risk (RM5x5 S:2 L:3)
|
Moderate Risk (RM5x5 S:2 L:4)
|
High Risk (RM5x5 S:2 L:5)
|
Very Low Risk (RM5x5 S:3 L:1)
|
Moderate Risk (RM5x5 S:3 L:2)
|
Moderate Risk (RM5x5 S:3 L:3)
|
High Risk (RM5x5 S:3 L:4)
|
Very High Risk (RM5x5 S:3 L:5)
|
Low Risk (RM5x5 S:4 L:1)
|
Moderate Risk (RM5x5 S:4 L:2)
|
High Risk (RM5x5 S:4 L:3)
|
Very High Risk (RM5x5 S:4 L:4)
|
Very High Risk (RM5x5 S:4 L:5)
|
Low Risk (RM5x5 S:5 L:1)
|
High Risk (RM5x5 S:5 L:2)
|
High Risk (RM5x5 S:5 L:3)
|
Very High Risk (RM5x5 S:5 L:4)
|
Very High Risk (RM5x5 S:5 L:5)
|
Extremely Low Risk (RM7x7 S:1 L:1)
|
Extremely Low Risk (RM7x7 S:1 L:2)
|
Extremely Low Risk (RM7x7 S:1 L:3)
|
Very Low Risk (RM7x7 S:1 L:4)
|
Very Low Risk (RM7x7 S:1 L:5)
|
Very Low Risk (RM7x7 S:1 L:6)
|
Low Risk (RM7x7 S:1 L:7)
|
Extremely Low Risk (RM7x7 S:2 L:1)
|
Extremely Low Risk (RM7x7 S:2 L:2)
|
Very Low Risk (RM7x7 S:2 L:3)
|
Low Risk (RM7x7 S:2 L:4)
|
Low Risk (RM7x7 S:2 L:5)
|
Moderate Risk (RM7x7 S:2 L:6)
|
Moderate Risk (RM7x7 S:2 L:7)
|
Extremely Low Risk (RM7x7 S:3 L:1)
|
Very Low Risk (RM7x7 S:3 L:2)
|
Low Risk (RM7x7 S:3 L:3)
|
Moderate Risk (RM7x7 S:3 L:4)
|
High Risk (RM7x7 S:3 L:5)
|
High Risk (RM7x7 S:3 L:6)
|
Very High Risk (RM7x7 S:3 L:7)
|
Extremely Low Risk (RM7x7 S:4 L:1)
|
Low Risk (RM7x7 S:4 L:2)
|
Moderate Risk (RM7x7 S:4 L:3)
|
High Risk (RM7x7 S:4 L:4)
|
High Risk (RM7x7 S:4 L:5)
|
Very High Risk (RM7x7 S:4 L:6)
|
Very High Risk (RM7x7 S:4 L:7)
|
Very Low Risk (RM7x7 S:5 L:1)
|
Low Risk (RM7x7 S:5 L:2)
|
Moderate Risk (RM7x7 S:5 L:3)
|
High Risk (RM7x7 S:5 L:4)
|
Very High Risk (RM7x7 S:5 L:5)
|
Extremely High Risk (RM7x7 S:5 L:6)
|
Extremely High Risk (RM7x7 S:5 L:7)
|
Very Low Risk (RM7x7 S:6 L:1)
|
Moderate Risk (RM7x7 S:6 L:2)
|
High Risk (RM7x7 S:6 L:3)
|
Very High Risk (RM7x7 S:6 L:4)
|
Very High Risk (RM7x7 S:6 L:5)
|
Extremely High Risk (RM7x7 S:6 L:6)
|
Extremely High Risk (RM7x7 S:6 L:7)
|
Low Risk (RM7x7 S:7 L:1)
|
Moderate Risk (RM7x7 S:7 L:2)
|
High Risk (RM7x7 S:7 L:3)
|
Very High Risk (RM7x7 S:7 L:4)
|
Extremely High Risk (RM7x7 S:7 L:5)
|
Extremely High Risk (RM7x7 S:7 L:6)
|
Extremely High Risk (RM7x7 S:7 L:7)
|
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskMatrix3x3 |
Term: | RiskMatrix3x3 |
Label: | Risk Matrix 3x3 |
Description: | A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types |
SubClass of: | dpvs-risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskMatrix5x5 |
Term: | RiskMatrix5x5 |
Label: | Risk Matrix 5x5 |
Description: | A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types |
SubClass of: | dpvs-risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RiskMatrix7x7 |
Term: | RiskMatrix7x7 |
Label: | Risk Matrix 7x7 |
Description: | A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types |
SubClass of: | dpvs-risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S1L1 |
Term: | RM3x3S1L1 |
Label: | Low Risk (RM3x3 S:1 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.11 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S1L2 |
Term: | RM3x3S1L2 |
Label: | Low Risk (RM3x3 S:1 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.22 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S1L3 |
Term: | RM3x3S1L3 |
Label: | Moderate Risk (RM3x3 S:1 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.33 |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S2L1 |
Term: | RM3x3S2L1 |
Label: | Low Risk (RM3x3 S:2 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.22 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S2L2 |
Term: | RM3x3S2L2 |
Label: | Moderate Risk (RM3x3 S:2 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.44 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S2L3 |
Term: | RM3x3S2L3 |
Label: | High Risk (RM3x3 S:2 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.67 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S3L1 |
Term: | RM3x3S3L1 |
Label: | Moderate Risk (RM3x3 S:3 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.33 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S3L2 |
Term: | RM3x3S3L2 |
Label: | High Risk (RM3x3 S:3 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 0.67 |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM3x3S3L3 |
Term: | RM3x3S3L3 |
Label: | High Risk (RM3x3 S:3 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix3x3 |
Instance of: | dpvs-risk:RiskMatrix3x3 |
rdf:value | 1.00 |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S1L1 |
Term: | RM5x5S1L1 |
Label: | Very Low Risk (RM5x5 S:1 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.04 |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S1L2 |
Term: | RM5x5S1L2 |
Label: | Very Low Risk (RM5x5 S:1 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.08 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S1L3 |
Term: | RM5x5S1L3 |
Label: | Very Low Risk (RM5x5 S:1 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.12 |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S1L4 |
Term: | RM5x5S1L4 |
Label: | Low Risk (RM5x5 S:1 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S1L5 |
Term: | RM5x5S1L5 |
Label: | Low Risk (RM5x5 S:1 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.20 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S2L1 |
Term: | RM5x5S2L1 |
Label: | Very Low Risk (RM5x5 S:2 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.08 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S2L2 |
Term: | RM5x5S2L2 |
Label: | Low Risk (RM5x5 S:2 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S2L3 |
Term: | RM5x5S2L3 |
Label: | Moderate Risk (RM5x5 S:2 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.24 |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S2L4 |
Term: | RM5x5S2L4 |
Label: | Moderate Risk (RM5x5 S:2 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.32 |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S2L5 |
Term: | RM5x5S2L5 |
Label: | High Risk (RM5x5 S:2 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.40 |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S3L1 |
Term: | RM5x5S3L1 |
Label: | Very Low Risk (RM5x5 S:3 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.12 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S3L2 |
Term: | RM5x5S3L2 |
Label: | Moderate Risk (RM5x5 S:3 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.24 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S3L3 |
Term: | RM5x5S3L3 |
Label: | Moderate Risk (RM5x5 S:3 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.36 |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S3L4 |
Term: | RM5x5S3L4 |
Label: | High Risk (RM5x5 S:3 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.48 |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S3L5 |
Term: | RM5x5S3L5 |
Label: | Very High Risk (RM5x5 S:3 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.60 |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S4L1 |
Term: | RM5x5S4L1 |
Label: | Low Risk (RM5x5 S:4 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S4L2 |
Term: | RM5x5S4L2 |
Label: | Moderate Risk (RM5x5 S:4 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.32 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S4L3 |
Term: | RM5x5S4L3 |
Label: | High Risk (RM5x5 S:4 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.48 |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S4L4 |
Term: | RM5x5S4L4 |
Label: | Very High Risk (RM5x5 S:4 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.64 |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S4L5 |
Term: | RM5x5S4L5 |
Label: | Very High Risk (RM5x5 S:4 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.80 |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S5L1 |
Term: | RM5x5S5L1 |
Label: | Low Risk (RM5x5 S:5 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.20 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S5L2 |
Term: | RM5x5S5L2 |
Label: | High Risk (RM5x5 S:5 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.40 |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S5L3 |
Term: | RM5x5S5L3 |
Label: | High Risk (RM5x5 S:5 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.60 |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S5L4 |
Term: | RM5x5S5L4 |
Label: | Very High Risk (RM5x5 S:5 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 0.80 |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM5x5S5L5 |
Term: | RM5x5S5L5 |
Label: | Very High Risk (RM5x5 S:5 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix5x5 |
Instance of: | dpvs-risk:RiskMatrix5x5 |
rdf:value | 1.00 |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L1 |
Term: | RM7x7S1L1 |
Label: | Extremely Low Risk (RM7x7 S:1 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.02 |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L2 |
Term: | RM7x7S1L2 |
Label: | Extremely Low Risk (RM7x7 S:1 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.04 |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L3 |
Term: | RM7x7S1L3 |
Label: | Extremely Low Risk (RM7x7 S:1 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Low; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.06 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L4 |
Term: | RM7x7S1L4 |
Label: | Very Low Risk (RM7x7 S:1 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Moderate; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L5 |
Term: | RM7x7S1L5 |
Label: | Very Low Risk (RM7x7 S:1 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: High; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.10 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L6 |
Term: | RM7x7S1L6 |
Label: | Very Low Risk (RM7x7 S:1 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryHigh; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S1L7 |
Term: | RM7x7S1L7 |
Label: | Low Risk (RM7x7 S:1 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyHigh; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.14 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyLowSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L1 |
Term: | RM7x7S2L1 |
Label: | Extremely Low Risk (RM7x7 S:2 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.04 |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L2 |
Term: | RM7x7S2L2 |
Label: | Extremely Low Risk (RM7x7 S:2 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L3 |
Term: | RM7x7S2L3 |
Label: | Very Low Risk (RM7x7 S:2 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L4 |
Term: | RM7x7S2L4 |
Label: | Low Risk (RM7x7 S:2 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.16 |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L5 |
Term: | RM7x7S2L5 |
Label: | Low Risk (RM7x7 S:2 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.20 |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L6 |
Term: | RM7x7S2L6 |
Label: | Moderate Risk (RM7x7 S:2 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S2L7 |
Term: | RM7x7S2L7 |
Label: | Moderate Risk (RM7x7 S:2 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyHigh; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.29 |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasSeverity | dpvs-risk:VeryLowSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L1 |
Term: | RM7x7S3L1 |
Label: | Extremely Low Risk (RM7x7 S:3 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.06 |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L2 |
Term: | RM7x7S3L2 |
Label: | Very Low Risk (RM7x7 S:3 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L3 |
Term: | RM7x7S3L3 |
Label: | Low Risk (RM7x7 S:3 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.18 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L4 |
Term: | RM7x7S3L4 |
Label: | Moderate Risk (RM7x7 S:3 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L5 |
Term: | RM7x7S3L5 |
Label: | High Risk (RM7x7 S:3 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.31 |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L6 |
Term: | RM7x7S3L6 |
Label: | High Risk (RM7x7 S:3 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.37 |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S3L7 |
Term: | RM7x7S3L7 |
Label: | Very High Risk (RM7x7 S:3 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.43 |
dpvs:hasSeverity | dpvs-risk:LowSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L1 |
Term: | RM7x7S4L1 |
Label: | Extremely Low Risk (RM7x7 S:4 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyLowRisk |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L2 |
Term: | RM7x7S4L2 |
Label: | Low Risk (RM7x7 S:4 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.16 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L3 |
Term: | RM7x7S4L3 |
Label: | Moderate Risk (RM7x7 S:4 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L4 |
Term: | RM7x7S4L4 |
Label: | High Risk (RM7x7 S:4 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.33 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L5 |
Term: | RM7x7S4L5 |
Label: | High Risk (RM7x7 S:4 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.41 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L6 |
Term: | RM7x7S4L6 |
Label: | Very High Risk (RM7x7 S:4 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.49 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S4L7 |
Term: | RM7x7S4L7 |
Label: | Very High Risk (RM7x7 S:4 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.57 |
dpvs:hasSeverity | dpvs-risk:ModerateSeverity |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L1 |
Term: | RM7x7S5L1 |
Label: | Very Low Risk (RM7x7 S:5 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.10 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L2 |
Term: | RM7x7S5L2 |
Label: | Low Risk (RM7x7 S:5 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.20 |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L3 |
Term: | RM7x7S5L3 |
Label: | Moderate Risk (RM7x7 S:5 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.31 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L4 |
Term: | RM7x7S5L4 |
Label: | High Risk (RM7x7 S:5 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.41 |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L5 |
Term: | RM7x7S5L5 |
Label: | Very High Risk (RM7x7 S:5 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.51 |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L6 |
Term: | RM7x7S5L6 |
Label: | Extremely High Risk (RM7x7 S:5 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.61 |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S5L7 |
Term: | RM7x7S5L7 |
Label: | Extremely High Risk (RM7x7 S:5 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.71 |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
dpvs:hasSeverity | dpvs-risk:HighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L1 |
Term: | RM7x7S6L1 |
Label: | Very Low Risk (RM7x7 S:6 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyLow; and Risk Level: VeryLow |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpvs:hasRiskLevel | dpvs-risk:VeryLowRisk |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L2 |
Term: | RM7x7S6L2 |
Label: | Moderate Risk (RM7x7 S:6 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L3 |
Term: | RM7x7S6L3 |
Label: | High Risk (RM7x7 S:6 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.37 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L4 |
Term: | RM7x7S6L4 |
Label: | Very High Risk (RM7x7 S:6 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.49 |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L5 |
Term: | RM7x7S6L5 |
Label: | Very High Risk (RM7x7 S:6 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.61 |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L6 |
Term: | RM7x7S6L6 |
Label: | Extremely High Risk (RM7x7 S:6 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.73 |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S6L7 |
Term: | RM7x7S6L7 |
Label: | Extremely High Risk (RM7x7 S:6 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.86 |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasSeverity | dpvs-risk:VeryHighSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L1 |
Term: | RM7x7S7L1 |
Label: | Low Risk (RM7x7 S:7 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyLow; and Risk Level: Low |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.14 |
dpvs:hasRiskLevel | dpvs-risk:LowRisk |
dpvs:hasLikelihood | dpvs-risk:ExtremelyLowLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L2 |
Term: | RM7x7S7L2 |
Label: | Moderate Risk (RM7x7 S:7 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryLow; and Risk Level: Moderate |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.29 |
dpvs:hasLikelihood | dpvs-risk:VeryLowLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L3 |
Term: | RM7x7S7L3 |
Label: | High Risk (RM7x7 S:7 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Low; and Risk Level: High |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.43 |
dpvs:hasLikelihood | dpvs-risk:LowLikelihood |
dpvs:hasRiskLevel | dpvs-risk:HighRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L4 |
Term: | RM7x7S7L4 |
Label: | Very High Risk (RM7x7 S:7 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Moderate; and Risk Level: VeryHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.57 |
dpvs:hasRiskLevel | dpvs-risk:VeryHighRisk |
dpvs:hasLikelihood | dpvs-risk:ModerateLikelihood |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L5 |
Term: | RM7x7S7L5 |
Label: | Extremely High Risk (RM7x7 S:7 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: High; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.71 |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
dpvs:hasLikelihood | dpvs-risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L6 |
Term: | RM7x7S7L6 |
Label: | Extremely High Risk (RM7x7 S:7 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 0.86 |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasLikelihood | dpvs-risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/risk#RM7x7S7L7 |
Term: | RM7x7S7L7 |
Label: | Extremely High Risk (RM7x7 S:7 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Narrower than: | dpvs-risk:RiskMatrix7x7 |
Instance of: | dpvs-risk:RiskMatrix7x7 |
rdf:value | 1.00 |
dpvs:hasRiskLevel | dpvs-risk:ExtremelyHighRisk |
dpvs:hasSeverity | dpvs-risk:ExtremelyHighSeverity |
dpvs:hasLikelihood | dpvs-risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
The following terms have been proposed for inclusion, and are under discussion. They are provided here for illustrative purposes and should not be considered as part of DPV.
risk_consequencesThe DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.
Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.
The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)
4.1.115 Social Disadvantage
https://w3id.org/dpv/dpv-skos/risk#SocialDisadvantage