Risk Extension for DPV

version 0.8.2

Draft Community Group Report

Latest published version:
https://w3id.org/dpv/risk
Latest editor's draft:
https://w3id.org/dpv/ed/risk
Editor:
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Authors:
Beatriz Esteves (Universidad Politécnica de Madrid)
Georg P. Krog (Signatu AS)
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Julian Flake (University of Koblenz-Landau)
Paul Ryan (Uniphar PLC)
Feedback:
GitHub w3c/dpv (pull requests, new issue, open issues)

Risk concepts extend the Data Privacy Vocabulary (DPV) Specification risk vocabulary to provide additional vocabularies specific to risk management, assessment, controls, and consequences.

The namespace for terms in risk is https://www.w3id.org/dpv/risk#
The suggested prefix for the namespace is risk
The risk vocabulary and its documentation is available on GitHub.

DPV Family of Documents

Related Links

Status of This Document

This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Contributor License Agreement (CLA) there is a limited opt-out and other conditions apply. Learn more about W3C Community and Business Groups.

This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).

Note

Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.

GitHub Issues are preferred for discussion of this specification.

1. Introduction

Issue 74: Add Risk Management concepts WIPhelp-wantedrisk

The DPV-Risk extension https://w3id.org/dpv/risk lists risk assessments, consequences, impacts, methodologies, matrices, etc. But does not refer to other concepts in risk management (criterias, governance, sources, threats, evaluation, etc.) These should be added.

  1. RiskManagement
  2. RiskAssessment
  3. RiskIdentification
  4. RiskAnalysis
  5. RiskEvaluation
  6. RiskAcceptance
  7. ThreatIdentification
  8. ThreatEvaluation
  9. RiskMitigation
  10. RiskControlAssessment
  11. RiskTreatment
  12. RiskPerception
  13. RiskCriteria
  14. Risk Source
  15. RiskThreat
  16. RiskOwner

2. Risk, Likelihood, Severity Levels

2.1 Classes

3 Likelihood Levels | 3 Risk Levels | 3 Severity Levels | 5 Likelihood Levels | 5 Risk Levels | 5 Severity Levels | 7 Likelihood Levels | 7 Risk Levels | 7 Severity Levels | Extremely High Likelihood | Extremely High Risk | Extremely High Severity | Extremely Low Likelihood | Extremely Low Risk | Extremely Low Severity | High Likelihood | High Risk | High Severity | Low Likelihood | Low Risk | Low Severity | Moderate Likelihood | Moderate Risk | Moderate Severity | Very High Likelihood | Very High Risk | Very High Severity | Very Low Likelihood | Very Low Risk | Very Low Severity |

2.1.1 3 Likelihood Levels

IRI https://w3id.org/dpv/risk#3LikelihoodLevels
Term: 3LikelihoodLevels
Label: 3 Likelihood Levels
Description: Scale with 3 Likelihood Levels from High to Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.2 3 Risk Levels

IRI https://w3id.org/dpv/risk#3RiskLevels
Term: 3RiskLevels
Label: 3 Risk Levels
Description: Scale with 3 Risk Levels from High to Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.3 3 Severity Levels

IRI https://w3id.org/dpv/risk#3SeverityLevels
Term: 3SeverityLevels
Label: 3 Severity Levels
Description: Scale with 3 Severity Levels from High to Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.4 5 Likelihood Levels

IRI https://w3id.org/dpv/risk#5LikelihoodLevels
Term: 5LikelihoodLevels
Label: 5 Likelihood Levels
Description: Scale with 5 Likelihood Levels from Very High to Very Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.5 5 Risk Levels

IRI https://w3id.org/dpv/risk#5RiskLevels
Term: 5RiskLevels
Label: 5 Risk Levels
Description: Scale with 5 Risk Levels from Very High to Very Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.6 5 Severity Levels

IRI https://w3id.org/dpv/risk#5SeverityLevels
Term: 5SeverityLevels
Label: 5 Severity Levels
Description: Scale with 5 Severity Levels from Very High to Very Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.7 7 Likelihood Levels

IRI https://w3id.org/dpv/risk#7LikelihoodLevels
Term: 7LikelihoodLevels
Label: 7 Likelihood Levels
Description: Scale with 7 Likelihood Levels from Extremely High to Extremely Low
SubType of: dpv:Likelihood
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.8 7 Risk Levels

IRI https://w3id.org/dpv/risk#7RiskLevels
Term: 7RiskLevels
Label: 7 Risk Levels
Description: Scale with 7 Risk Levels from Extremely High to Extremely Low
SubType of: dpv:RiskLevel
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.9 7 Severity Levels

IRI https://w3id.org/dpv/risk#7SeverityLevels
Term: 7SeverityLevels
Label: 7 Severity Levels
Description: Scale with 7 Severity Levels from Extremely High to Extremely Low
SubType of: dpv:Severity
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.10 Extremely High Likelihood

IRI https://w3id.org/dpv/risk#ExtremelyHighLikelihood
Term: ExtremelyHighLikelihood
Label: Extremely High Likelihood
Description: Level where Likelihood is Extremely High
Instance of: dpv:Likelihood, risk:7LikelihoodLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.11 Extremely High Risk

IRI https://w3id.org/dpv/risk#ExtremelyHighRisk
Term: ExtremelyHighRisk
Label: Extremely High Risk
Description: Level where Risk is Extremely High
Instance of: dpv:RiskLevel, risk:7RiskLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.12 Extremely High Severity

IRI https://w3id.org/dpv/risk#ExtremelyHighSeverity
Term: ExtremelyHighSeverity
Label: Extremely High Severity
Description: Level where Severity is Extremely High
Instance of: dpv:Severity, risk:7SeverityLevels
rdf:value 0.99
Note: The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.13 Extremely Low Likelihood

IRI https://w3id.org/dpv/risk#ExtremelyLowLikelihood
Term: ExtremelyLowLikelihood
Label: Extremely Low Likelihood
Description: Level where Likelihood is Extremely Low
Instance of: dpv:Likelihood, risk:7LikelihoodLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.14 Extremely Low Risk

IRI https://w3id.org/dpv/risk#ExtremelyLowRisk
Term: ExtremelyLowRisk
Label: Extremely Low Risk
Description: Level where Risk is Extremely Low
Instance of: dpv:RiskLevel, risk:7RiskLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.15 Extremely Low Severity

IRI https://w3id.org/dpv/risk#ExtremelyLowSeverity
Term: ExtremelyLowSeverity
Label: Extremely Low Severity
Description: Level where Severity is Extremely Low
Instance of: dpv:Severity, risk:7SeverityLevels
rdf:value 0.01
Note: The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.16 High Likelihood

IRI https://w3id.org/dpv/risk#HighLikelihood
Term: HighLikelihood
Label: High Likelihood
Description: Level where Likelihood is High
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.17 High Risk

IRI https://w3id.org/dpv/risk#HighRisk
Term: HighRisk
Label: High Risk
Description: Level where Risk is High
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.18 High Severity

IRI https://w3id.org/dpv/risk#HighSeverity
Term: HighSeverity
Label: High Severity
Description: Level where Severity is High
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.75
Note: The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.19 Low Likelihood

IRI https://w3id.org/dpv/risk#LowLikelihood
Term: LowLikelihood
Label: Low Likelihood
Description: Level where Likelihood is Low
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.20 Low Risk

IRI https://w3id.org/dpv/risk#LowRisk
Term: LowRisk
Label: Low Risk
Description: Level where Risk is Low
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.21 Low Severity

IRI https://w3id.org/dpv/risk#LowSeverity
Term: LowSeverity
Label: Low Severity
Description: Level where Severity is Low
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.25
Note: The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.22 Moderate Likelihood

IRI https://w3id.org/dpv/risk#ModerateLikelihood
Term: ModerateLikelihood
Label: Moderate Likelihood
Description: Level where Likelihood is Moderate
Instance of: dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.23 Moderate Risk

IRI https://w3id.org/dpv/risk#ModerateRisk
Term: ModerateRisk
Label: Moderate Risk
Description: Level where Risk is Moderate
Instance of: dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.24 Moderate Severity

IRI https://w3id.org/dpv/risk#ModerateSeverity
Term: ModerateSeverity
Label: Moderate Severity
Description: Level where Severity is Moderate
Instance of: dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.5
Note: The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.25 Very High Likelihood

IRI https://w3id.org/dpv/risk#VeryHighLikelihood
Term: VeryHighLikelihood
Label: Very High Likelihood
Description: Level where Likelihood is Very High
Instance of: dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.26 Very High Risk

IRI https://w3id.org/dpv/risk#VeryHighRisk
Term: VeryHighRisk
Label: Very High Risk
Description: Level where Risk is Very High
Instance of: dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.27 Very High Severity

IRI https://w3id.org/dpv/risk#VeryHighSeverity
Term: VeryHighSeverity
Label: Very High Severity
Description: Level where Severity is Very High
Instance of: dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.9
Note: The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.28 Very Low Likelihood

IRI https://w3id.org/dpv/risk#VeryLowLikelihood
Term: VeryLowLikelihood
Label: Very Low Likelihood
Description: Level where Likelihood is Very Low
Instance of: dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.29 Very Low Risk

IRI https://w3id.org/dpv/risk#VeryLowRisk
Term: VeryLowRisk
Label: Very Low Risk
Description: Level where Risk is Very Low
Instance of: dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.30 Very Low Severity

IRI https://w3id.org/dpv/risk#VeryLowSeverity
Term: VeryLowSeverity
Label: Very Low Severity
Description: Level where Severity is Very Low
Instance of: dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels
rdf:value 0.1
Note: The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1
Created:
Contributor(s): Harshvardhan J. Pandit

3. Risk Controls

3.1 Classes

Avoid Source | Change Consequence | Change Impact | Control Consequence | Control Monitors | Control Risk Source | Halt Source | Monitor Consequence | Monitor Impact | Monitor Risk | Monitor Risk Control | Monitor Risk Source | Monitor Vulnerabilities | Reduce Likelihood | Reduce Severity | Remove Consequence | Remove Impact | Remove Source | Share Risk |

3.1.1 Avoid Source

IRI https://w3id.org/dpv/risk#AvoidSource
Term: AvoidSource
Label: Avoid Source
Description: Risk Control that avoids the risk source
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.2 Change Consequence

IRI https://w3id.org/dpv/risk#ChangeConsequence
Term: ChangeConsequence
Label: Change Consequence
Description: Risk Control that changes Consequence
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.3 Change Impact

IRI https://w3id.org/dpv/risk#ChangeImpact
Term: ChangeImpact
Label: Change Impact
Description: Risk Control that changes Impact
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.4 Control Consequence

IRI https://w3id.org/dpv/risk#ControlConsequence
Term: ControlConsequence
Label: Control Consequence
Description: Risk Mitigation Measure that controls the Consequences and Impacts
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.5 Control Monitors

IRI https://w3id.org/dpv/risk#ControlMonitors
Term: ControlMonitors
Label: Control Monitors
Description: Risk Mitigation Measure that uses controls to monitor events
SubType of: dpv:RiskMitigationMeasure
Note: Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.6 Control Risk Source

IRI https://w3id.org/dpv/risk#ControlRiskSource
Term: ControlRiskSource
Label: Control Risk Source
Description: Risk Mitigation Measure that controls the Risk Source
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.7 Halt Source

IRI https://w3id.org/dpv/risk#HaltSource
Term: HaltSource
Label: Halt Source
Description: Risk Control that halts the risk source or prevents it from materialising
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.8 Monitor Consequence

IRI https://w3id.org/dpv/risk#MonitorConsequence
Term: MonitorConsequence
Label: Monitor Consequence
Description: Risk Control that monitors a Risk Consequence
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.9 Monitor Impact

IRI https://w3id.org/dpv/risk#MonitorImpact
Term: MonitorImpact
Label: Monitor Impact
Description: Risk Control that monitors a Risk Impact
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.10 Monitor Risk

IRI https://w3id.org/dpv/risk#MonitorRisk
Term: MonitorRisk
Label: Monitor Risk
Description: Risk Control that monitors a Risk
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.11 Monitor Risk Control

IRI https://w3id.org/dpv/risk#MonitorRiskControl
Term: MonitorRiskControl
Label: Monitor Risk Control
Description: Risk Control that monitors another Risk Control
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.12 Monitor Risk Source

IRI https://w3id.org/dpv/risk#MonitorRiskSource
Term: MonitorRiskSource
Label: Monitor Risk Source
Description: Risk Control that monitors a Risk Source
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.13 Monitor Vulnerabilities

IRI https://w3id.org/dpv/risk#MonitorVulnerabilities
Term: MonitorVulnerabilities
Label: Monitor Vulnerabilities
Description: Risk Control that monitors a Risk Vulnerability
SubType of: risk:ControlMonitors
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.14 Reduce Likelihood

IRI https://w3id.org/dpv/risk#ReduceLikelihood
Term: ReduceLikelihood
Label: Reduce Likelihood
Description: Risk Control that reduces the likelihood of an event
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.15 Reduce Severity

IRI https://w3id.org/dpv/risk#ReduceSeverity
Term: ReduceSeverity
Label: Reduce Severity
Description: Risk Control that reduces the severity of an event
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.16 Remove Consequence

IRI https://w3id.org/dpv/risk#RemoveConsequence
Term: RemoveConsequence
Label: Remove Consequence
Description: Risk Control that removes Consequence i.e. prevents it from materialising
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.17 Remove Impact

IRI https://w3id.org/dpv/risk#RemoveImpact
Term: RemoveImpact
Label: Remove Impact
Description: Risk Control that removes Impact i.e. prevents it from materialising
SubType of: risk:ControlConsequence
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.18 Remove Source

IRI https://w3id.org/dpv/risk#RemoveSource
Term: RemoveSource
Label: Remove Source
Description: Risk Control that removes the risk source
SubType of: risk:ControlRiskSource
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.19 Share Risk

IRI https://w3id.org/dpv/risk#ShareRisk
Term: ShareRisk
Label: Share Risk
Description: Risk Mitigation Measure that shares Risk e.g. amongst stakeholders
SubType of: dpv:RiskMitigationMeasure
Created:
Contributor(s): Harshvardhan J. Pandit

4. Consequences and Impacts

4.1 Classes

Abusive Content Utilisation | Attack on Private Life | Authorisation Failure | Blackmail | Brute Force Authorisations | Business disruption | Business impact | Business Performance Impairment | Child Violence | Citizens impact | Coercion | Compliance impact | Compromise Account | Compromise Account Credentials | Compromise Account Security | Confidentiality Breach | Consequence for Data Subject | Consequence on Data Security | Copyright Violation | Corruption of Data | Cost of Acquisition | Cost of Backup | Cost of Configuration | Cost of Installation | Cost of Judicial Penalties | Cost of Judicial Proceedings | Cost of Operation Interruption | Cost of Suspended Operations | Cryptojacking | Cyber Spying | Cyber Stalking | Damage by Third Party | Danger to Customers | Danger to Personnel | Data Breach | Denial of Service Attack (DoS) | Detriment to Recovery | Discrimination | Distributed Denial of Service Attack (DDoS) | Eavesdropping | Economic Disadvantage | Environmental Safety Endangerment | Equipment Failure | Equipment Malfunction | Errornous System Use | Extorsion | Financial Equipment Costs | Financial Investigation Costs | Financial Loss | Financial Personnel Costs | Financial Repair Costs | Fraud | Government Crisis | Harmful Spech | Health and life impact | Human Errors | Identity Dispute | Identity Fraud | Identity Theft | Illegal Processing of Data | Impact on Data Subject | Impact to Rights | Increase Internal Cost | Industrial Crisis | Injury | Interception of Communications | Internal Operation Disruption | Known Vulnerability Exploited | Law Enforcement Adverse Effects | Limitation of Rights | Loss of Assets | Loss of Competitive Advantage | Loss of Control over Data | Loss of Credibility | Loss of Customer Confidence | Loss of Customers | Loss of Data | Loss of Funds | Loss of Goods | Loss of Goodwill | Loss of Negotiating Capacity | Loss of Opportunity | Loss of Proprietary Information | Loss of Reputation | Loss of Resources | Loss of Suppliers | Loss of Technological Advantage | Loss of Trust | Malicious Code Attack | Malware Attack | MisinformationDisinformation | Misuse of Breached Information | Organisation Disruption | Personal Safety Endangerment | Personnel Absence | Phishing Scam | Physical Assault | Physical Spying | Physical Stalking | Prevent Exercising of Rights | Privacy impact | Psychological Harm | Public Order Breach | RansomwareAttack | Remote Spying | Replacement Costs | Reputation and trust impact | Retrieval of Deleted Data | Retrieval of Discarded Equipment | Sabotage | Scam | Security Breach | Service Interruption | Sexual Violence | Social Disadvantage | Spam | Spoofing | Spying | Stalking | System Failure | System Intrusion | System Malfunction | Terrorism | Theft | Theft of Equipment | Theft of Media | Third Party Operation Disruption | Unauthorised Access to Premises | Unauthorised Code Access | Unauthorised Code Disclosure | Unauthorised Code Modification | Unauthorised Data Access | Unauthorised Data Disclosure | Unauthorised Data Modification | Unauthorised Impersonation | Unauthorised Information Disclosure | Unauthorised Re-Identification | Unauthorised Resource Use | Unauthorised System Access | Unauthorised System Modification | Unknown Vulnerability Exploited | Unwanted Code Deletion | Unwanted Data Deletion | Unwanted Disclosure of Data | Vandalism | Violation of Code of Conduct | Violation of Contractual Obligations | Violation of Ethical Code | Violation of Rights | Violation of Regulatory Obligations | Violation of Statutory Obligations | Vulnerability Created | Vulnerability Exploited |

4.1.1 Abusive Content Utilisation

IRI https://w3id.org/dpv/risk#AbusiveContentUtilisation
Term: AbusiveContentUtilisation
Label: Abusive Content Utilisation
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.2 Attack on Private Life

IRI https://w3id.org/dpv/risk#AttackonPrivateLife
Term: AttackonPrivateLife
Label: Attack on Private Life
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.3 Authorisation Failure

IRI https://w3id.org/dpv/risk#AuthorisationFailure
Term: AuthorisationFailure
Label: Authorisation Failure
Description:
SubType of: dpv:Detriment
Source: ENISa Trust Services Security Incidents 2021
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.4 Blackmail

IRI https://w3id.org/dpv/risk#Blackmail
Term: Blackmail
Label: Blackmail
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.5 Brute Force Authorisations

IRI https://w3id.org/dpv/risk#BruteForceAuthorisations
Term: BruteForceAuthorisations
Label: Brute Force Authorisations
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.6 Business disruption

IRI https://w3id.org/dpv/risk#Businessdisruption
Term: Businessdisruption
Label: Business disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.7 Business impact

IRI https://w3id.org/dpv/risk#BusinessImpact
Term: BusinessImpact
Label: Business impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.8 Business Performance Impairment

IRI https://w3id.org/dpv/risk#BusinessPerformanceImpairment
Term: BusinessPerformanceImpairment
Label: Business Performance Impairment
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.9 Child Violence

IRI https://w3id.org/dpv/risk#ChildViolence
Term: ChildViolence
Label: Child Violence
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.10 Citizens impact

IRI https://w3id.org/dpv/risk#CitizensImpact
Term: CitizensImpact
Label: Citizens impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.11 Coercion

IRI https://w3id.org/dpv/risk#Coercion
Term: Coercion
Label: Coercion
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.12 Compliance impact

IRI https://w3id.org/dpv/risk#ComplianceImpact
Term: ComplianceImpact
Label: Compliance impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.13 Compromise Account

IRI https://w3id.org/dpv/risk#CompromiseAccount
Term: CompromiseAccount
Label: Compromise Account
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.14 Compromise Account Credentials

IRI https://w3id.org/dpv/risk#CompromiseAccountCredentials
Term: CompromiseAccountCredentials
Label: Compromise Account Credentials
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.15 Compromise Account Security

IRI https://w3id.org/dpv/risk#CompromiseAccountSecurity
Term: CompromiseAccountSecurity
Label: Compromise Account Security
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.16 Confidentiality Breach

IRI https://w3id.org/dpv/risk#ConfidentialityBreach
Term: ConfidentialityBreach
Label: Confidentiality Breach
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.17 Consequence for Data Subject

IRI https://w3id.org/dpv/risk#ConsequenceForDataSubject
Term: ConsequenceForDataSubject
Label: Consequence for Data Subject
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.18 Consequence on Data Security

IRI https://w3id.org/dpv/risk#ConsequenceOnDataSecurity
Term: ConsequenceOnDataSecurity
Label: Consequence on Data Security
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.20 Corruption of Data

IRI https://w3id.org/dpv/risk#CorruptionData
Term: CorruptionData
Label: Corruption of Data
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.21 Cost of Acquisition

IRI https://w3id.org/dpv/risk#CostAcquisition
Term: CostAcquisition
Label: Cost of Acquisition
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.22 Cost of Backup

IRI https://w3id.org/dpv/risk#CostBackup
Term: CostBackup
Label: Cost of Backup
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.23 Cost of Configuration

IRI https://w3id.org/dpv/risk#CostConfiguration
Term: CostConfiguration
Label: Cost of Configuration
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.24 Cost of Installation

IRI https://w3id.org/dpv/risk#CostInstallation
Term: CostInstallation
Label: Cost of Installation
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.25 Cost of Judicial Penalties

IRI https://w3id.org/dpv/risk#CostJudicialPenalties
Term: CostJudicialPenalties
Label: Cost of Judicial Penalties
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.26 Cost of Judicial Proceedings

IRI https://w3id.org/dpv/risk#CostJudicialProceedings
Term: CostJudicialProceedings
Label: Cost of Judicial Proceedings
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.27 Cost of Operation Interruption

IRI https://w3id.org/dpv/risk#CostOperationInterruption
Term: CostOperationInterruption
Label: Cost of Operation Interruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.28 Cost of Suspended Operations

IRI https://w3id.org/dpv/risk#CostSuspendedOperations
Term: CostSuspendedOperations
Label: Cost of Suspended Operations
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.29 Cryptojacking

IRI https://w3id.org/dpv/risk#Cryptojacking
Term: Cryptojacking
Label: Cryptojacking
Description: Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency
SubType of: dpv:Detriment
Source: ENISA Threat Landscape 2021
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.30 Cyber Spying

IRI https://w3id.org/dpv/risk#CyberSpying
Term: CyberSpying
Label: Cyber Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.31 Cyber Stalking

IRI https://w3id.org/dpv/risk#CyberStalking
Term: CyberStalking
Label: Cyber Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.32 Damage by Third Party

IRI https://w3id.org/dpv/risk#DamageByThirdParty
Term: DamageByThirdParty
Label: Damage by Third Party
Description:
SubType of: dpv:Damage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.33 Danger to Customers

IRI https://w3id.org/dpv/risk#DangertoCustomers
Term: DangertoCustomers
Label: Danger to Customers
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.34 Danger to Personnel

IRI https://w3id.org/dpv/risk#DangertoPersonnel
Term: DangertoPersonnel
Label: Danger to Personnel
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.35 Data Breach

IRI https://w3id.org/dpv/risk#DataBreach
Term: DataBreach
Label: Data Breach
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.36 Denial of Service Attack (DoS)

IRI https://w3id.org/dpv/risk#DenialServiceAttack
Term: DenialServiceAttack
Label: Denial of Service Attack (DoS)
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.37 Detriment to Recovery

IRI https://w3id.org/dpv/risk#DetrimentToRecovery
Term: DetrimentToRecovery
Label: Detriment to Recovery
Description:
SubType of: dpv:Detriment
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.38 Discrimination

IRI https://w3id.org/dpv/risk#Discrimination
Term: Discrimination
Label: Discrimination
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog

4.1.39 Distributed Denial of Service Attack (DDoS)

IRI https://w3id.org/dpv/risk#DistributedDenialServiceAttack
Term: DistributedDenialServiceAttack
Label: Distributed Denial of Service Attack (DDoS)
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.40 Eavesdropping

IRI https://w3id.org/dpv/risk#Eavesdropping
Term: Eavesdropping
Label: Eavesdropping
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.41 Economic Disadvantage

IRI https://w3id.org/dpv/risk#EconomicDisadvantage
Term: EconomicDisadvantage
Label: Economic Disadvantage
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog

4.1.42 Environmental Safety Endangerment

IRI https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment
Term: EnvironmentalSafetyEndangerment
Label: Environmental Safety Endangerment
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.43 Equipment Failure

IRI https://w3id.org/dpv/risk#EquipmentFailure
Term: EquipmentFailure
Label: Equipment Failure
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.44 Equipment Malfunction

IRI https://w3id.org/dpv/risk#EquipmentMalfunction
Term: EquipmentMalfunction
Label: Equipment Malfunction
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.45 Errornous System Use

IRI https://w3id.org/dpv/risk#ErrornousSystemUse
Term: ErrornousSystemUse
Label: Errornous System Use
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.46 Extorsion

IRI https://w3id.org/dpv/risk#Extorsion
Term: Extorsion
Label: Extorsion
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.47 Financial Equipment Costs

IRI https://w3id.org/dpv/risk#FinancialEquipmentCosts
Term: FinancialEquipmentCosts
Label: Financial Equipment Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.48 Financial Investigation Costs

IRI https://w3id.org/dpv/risk#FinancialInvestigationCosts
Term: FinancialInvestigationCosts
Label: Financial Investigation Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.49 Financial Loss

IRI https://w3id.org/dpv/risk#FinancialLoss
Term: FinancialLoss
Label: Financial Loss
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.50 Financial Personnel Costs

IRI https://w3id.org/dpv/risk#FinancialPersonnelCosts
Term: FinancialPersonnelCosts
Label: Financial Personnel Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.51 Financial Repair Costs

IRI https://w3id.org/dpv/risk#FinancialRepairCosts
Term: FinancialRepairCosts
Label: Financial Repair Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.52 Fraud

IRI https://w3id.org/dpv/risk#Fraud
Term: Fraud
Label: Fraud
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.53 Government Crisis

IRI https://w3id.org/dpv/risk#GovernmentCrisis
Term: GovernmentCrisis
Label: Government Crisis
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.54 Harmful Spech

IRI https://w3id.org/dpv/risk#HarmfulSpeech
Term: HarmfulSpeech
Label: Harmful Spech
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.55 Health and life impact

IRI https://w3id.org/dpv/risk#HealthLifeImpact
Term: HealthLifeImpact
Label: Health and life impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.56 Human Errors

IRI https://w3id.org/dpv/risk#HumanErrors
Term: HumanErrors
Label: Human Errors
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.57 Identity Dispute

IRI https://w3id.org/dpv/risk#IdentityDispute
Term: IdentityDispute
Label: Identity Dispute
Description:
SubType of: dpv:Detriment
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.58 Identity Fraud

IRI https://w3id.org/dpv/risk#IdentityFraud
Term: IdentityFraud
Label: Identity Fraud
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.59 Identity Theft

IRI https://w3id.org/dpv/risk#IdentityTheft
Term: IdentityTheft
Label: Identity Theft
Description:
SubType of: dpv:Harm
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.60 Illegal Processing of Data

IRI https://w3id.org/dpv/risk#IllegalProcessingData
Term: IllegalProcessingData
Label: Illegal Processing of Data
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.61 Impact on Data Subject

IRI https://w3id.org/dpv/risk#ImpactOnDataSubject
Term: ImpactOnDataSubject
Label: Impact on Data Subject
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.62 Impact to Rights

IRI https://w3id.org/dpv/risk#ImpacttoRights
Term: ImpacttoRights
Label: Impact to Rights
Description:
SubType of: dpv:Impact
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.63 Increase Internal Cost

IRI https://w3id.org/dpv/risk#IncreaseInternalCost
Term: IncreaseInternalCost
Label: Increase Internal Cost
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.64 Industrial Crisis

IRI https://w3id.org/dpv/risk#IndustrialCrisis
Term: IndustrialCrisis
Label: Industrial Crisis
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.65 Injury

IRI https://w3id.org/dpv/risk#Injury
Term: Injury
Label: Injury
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.66 Interception of Communications

IRI https://w3id.org/dpv/risk#InterceptionCommunications
Term: InterceptionCommunications
Label: Interception of Communications
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.67 Internal Operation Disruption

IRI https://w3id.org/dpv/risk#InternalOperationDisruption
Term: InternalOperationDisruption
Label: Internal Operation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.68 Known Vulnerability Exploited

IRI https://w3id.org/dpv/risk#KnownVulnerabilityExploited
Term: KnownVulnerabilityExploited
Label: Known Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.69 Law Enforcement Adverse Effects

IRI https://w3id.org/dpv/risk#LawEnforcementAdverseEffects
Term: LawEnforcementAdverseEffects
Label: Law Enforcement Adverse Effects
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.70 Limitation of Rights

IRI https://w3id.org/dpv/risk#LimitationOfRights
Term: LimitationOfRights
Label: Limitation of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.71 Loss of Assets

IRI https://w3id.org/dpv/risk#LossAssets
Term: LossAssets
Label: Loss of Assets
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.72 Loss of Competitive Advantage

IRI https://w3id.org/dpv/risk#LossCompetitiveAdvantage
Term: LossCompetitiveAdvantage
Label: Loss of Competitive Advantage
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.73 Loss of Control over Data

IRI https://w3id.org/dpv/risk#LossControlOverData
Term: LossControlOverData
Label: Loss of Control over Data
Description:
SubType of: dpv:NonMaterialDamage
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.74 Loss of Credibility

IRI https://w3id.org/dpv/risk#LossCredibility
Term: LossCredibility
Label: Loss of Credibility
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.75 Loss of Customer Confidence

IRI https://w3id.org/dpv/risk#LossCustomerConfidence
Term: LossCustomerConfidence
Label: Loss of Customer Confidence
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.76 Loss of Customers

IRI https://w3id.org/dpv/risk#LossCustomers
Term: LossCustomers
Label: Loss of Customers
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.77 Loss of Data

IRI https://w3id.org/dpv/risk#LossData
Term: LossData
Label: Loss of Data
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.78 Loss of Funds

IRI https://w3id.org/dpv/risk#LossFunds
Term: LossFunds
Label: Loss of Funds
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.79 Loss of Goods

IRI https://w3id.org/dpv/risk#LossGoods
Term: LossGoods
Label: Loss of Goods
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.80 Loss of Goodwill

IRI https://w3id.org/dpv/risk#LossGoodwill
Term: LossGoodwill
Label: Loss of Goodwill
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.81 Loss of Negotiating Capacity

IRI https://w3id.org/dpv/risk#LossNegotiatingCapacity
Term: LossNegotiatingCapacity
Label: Loss of Negotiating Capacity
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.82 Loss of Opportunity

IRI https://w3id.org/dpv/risk#LossOpportunity
Term: LossOpportunity
Label: Loss of Opportunity
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.83 Loss of Proprietary Information

IRI https://w3id.org/dpv/risk#LossProprietaryInformation
Term: LossProprietaryInformation
Label: Loss of Proprietary Information
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.84 Loss of Reputation

IRI https://w3id.org/dpv/risk#LossReputation
Term: LossReputation
Label: Loss of Reputation
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.85 Loss of Resources

IRI https://w3id.org/dpv/risk#LossResources
Term: LossResources
Label: Loss of Resources
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.86 Loss of Suppliers

IRI https://w3id.org/dpv/risk#LossSuppliers
Term: LossSuppliers
Label: Loss of Suppliers
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.87 Loss of Technological Advantage

IRI https://w3id.org/dpv/risk#LossTechnologicalAdvantage
Term: LossTechnologicalAdvantage
Label: Loss of Technological Advantage
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.88 Loss of Trust

IRI https://w3id.org/dpv/risk#LossTrust
Term: LossTrust
Label: Loss of Trust
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.89 Malicious Code Attack

IRI https://w3id.org/dpv/risk#MaliciousCodeAttack
Term: MaliciousCodeAttack
Label: Malicious Code Attack
Description: Intentional use of software by including or inserting in a system for a harmful purpose
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.90 Malware Attack

IRI https://w3id.org/dpv/risk#MalwareAttack
Term: MalwareAttack
Label: Malware Attack
Description: Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.91 MisinformationDisinformation

IRI https://w3id.org/dpv/risk#MisinformationDisinformation
Term: MisinformationDisinformation
Label: MisinformationDisinformation
Description: Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation)
SubType of: dpv:Detriment
Source: ENISA Threat Landscape 2021
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.92 Misuse of Breached Information

IRI https://w3id.org/dpv/risk#MisuseBreachedInformation
Term: MisuseBreachedInformation
Label: Misuse of Breached Information
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.93 Organisation Disruption

IRI https://w3id.org/dpv/risk#OrganisationDisruption
Term: OrganisationDisruption
Label: Organisation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.94 Personal Safety Endangerment

IRI https://w3id.org/dpv/risk#PersonalSafetyEndangerment
Term: PersonalSafetyEndangerment
Label: Personal Safety Endangerment
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.95 Personnel Absence

IRI https://w3id.org/dpv/risk#PersonnelAbsence
Term: PersonnelAbsence
Label: Personnel Absence
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.96 Phishing Scam

IRI https://w3id.org/dpv/risk#PhishingScam
Term: PhishingScam
Label: Phishing Scam
Description: A type of social engineering attack involving deceptive messages intended to reveal sensitive information
SubType of: dpv:Harm
Source: ENISA Threat Landscape for Ransomware Attacks 2022
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.97 Physical Assault

IRI https://w3id.org/dpv/risk#PhysicalAssault
Term: PhysicalAssault
Label: Physical Assault
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.98 Physical Spying

IRI https://w3id.org/dpv/risk#PhysicalSpying
Term: PhysicalSpying
Label: Physical Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.99 Physical Stalking

IRI https://w3id.org/dpv/risk#PhysicalStalking
Term: PhysicalStalking
Label: Physical Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.100 Prevent Exercising of Rights

IRI https://w3id.org/dpv/risk#PreventExercisingOfRights
Term: PreventExercisingOfRights
Label: Prevent Exercising of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.101 Privacy impact

IRI https://w3id.org/dpv/risk#PrivacyImpact
Term: PrivacyImpact
Label: Privacy impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.102 Psychological Harm

IRI https://w3id.org/dpv/risk#PsychologicalHarm
Term: PsychologicalHarm
Label: Psychological Harm
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.103 Public Order Breach

IRI https://w3id.org/dpv/risk#PublicOrderBreach
Term: PublicOrderBreach
Label: Public Order Breach
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.104 RansomwareAttack

IRI https://w3id.org/dpv/risk#RansomwareAttack
Term: RansomwareAttack
Label: RansomwareAttack
Description: Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality
SubType of: dpv:NonMaterialDamage
Source: ENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.105 Remote Spying

IRI https://w3id.org/dpv/risk#RemoteSpying
Term: RemoteSpying
Label: Remote Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.106 Replacement Costs

IRI https://w3id.org/dpv/risk#ReplacementCosts
Term: ReplacementCosts
Label: Replacement Costs
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.107 Reputation and trust impact

IRI https://w3id.org/dpv/risk#ReputationTrustImpact
Term: ReputationTrustImpact
Label: Reputation and trust impact
Description:
SubType of: dpv:Impact
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.108 Retrieval of Deleted Data

IRI https://w3id.org/dpv/risk#RetrievalDeletedData
Term: RetrievalDeletedData
Label: Retrieval of Deleted Data
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.109 Retrieval of Discarded Equipment

IRI https://w3id.org/dpv/risk#RetrievalDiscardedEquipment
Term: RetrievalDiscardedEquipment
Label: Retrieval of Discarded Equipment
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.110 Sabotage

IRI https://w3id.org/dpv/risk#Sabotage
Term: Sabotage
Label: Sabotage
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.111 Scam

IRI https://w3id.org/dpv/risk#Scam
Term: Scam
Label: Scam
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.112 Security Breach

IRI https://w3id.org/dpv/risk#SecurityBreach
Term: SecurityBreach
Label: Security Breach
Description:
SubType of: dpv:Consequence
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.113 Service Interruption

IRI https://w3id.org/dpv/risk#ServiceInterruption
Term: ServiceInterruption
Label: Service Interruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.114 Sexual Violence

IRI https://w3id.org/dpv/risk#SexualViolence
Term: SexualViolence
Label: Sexual Violence
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.115 Social Disadvantage

IRI https://w3id.org/dpv/risk#SocialDisadvantage
Term: SocialDisadvantage
Label: Social Disadvantage
Description:
SubType of: dpv:Impact
Created:
Contributor(s): Georg P Krog

4.1.116 Spam

IRI https://w3id.org/dpv/risk#Spam
Term: Spam
Label: Spam
Description:
SubType of: dpv:Harm
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.117 Spoofing

IRI https://w3id.org/dpv/risk#Spoofing
Term: Spoofing
Label: Spoofing
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.118 Spying

IRI https://w3id.org/dpv/risk#Spying
Term: Spying
Label: Spying
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.119 Stalking

IRI https://w3id.org/dpv/risk#Stalking
Term: Stalking
Label: Stalking
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.120 System Failure

IRI https://w3id.org/dpv/risk#SystemFailure
Term: SystemFailure
Label: System Failure
Description:
SubType of: dpv:Detriment
Source: ENISA Threat Landscape for Ransomware Attacks 2022
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.121 System Intrusion

IRI https://w3id.org/dpv/risk#SystemIntrusion
Term: SystemIntrusion
Label: System Intrusion
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.122 System Malfunction

IRI https://w3id.org/dpv/risk#SystemMalfunction
Term: SystemMalfunction
Label: System Malfunction
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.123 Terrorism

IRI https://w3id.org/dpv/risk#Terrorism
Term: Terrorism
Label: Terrorism
Description:
SubType of: dpv:Harm
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.124 Theft

IRI https://w3id.org/dpv/risk#Theft
Term: Theft
Label: Theft
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.125 Theft of Equipment

IRI https://w3id.org/dpv/risk#TheftEquipment
Term: TheftEquipment
Label: Theft of Equipment
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.126 Theft of Media

IRI https://w3id.org/dpv/risk#TheftMedia
Term: TheftMedia
Label: Theft of Media
Description:
SubType of: dpv:MaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.127 Third Party Operation Disruption

IRI https://w3id.org/dpv/risk#ThirdPartyOperationDisruption
Term: ThirdPartyOperationDisruption
Label: Third Party Operation Disruption
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.128 Unauthorised Access to Premises

IRI https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises
Term: UnauthorisedAccesstoPremises
Label: Unauthorised Access to Premises
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.129 Unauthorised Code Access

IRI https://w3id.org/dpv/risk#UnauthorisedCodeAccess
Term: UnauthorisedCodeAccess
Label: Unauthorised Code Access
Description:
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.130 Unauthorised Code Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure
Term: UnauthorisedCodeDisclosure
Label: Unauthorised Code Disclosure
Description:
SubType of: dpv:Detriment
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.131 Unauthorised Code Modification

IRI https://w3id.org/dpv/risk#UnauthorisedCodeModification
Term: UnauthorisedCodeModification
Label: Unauthorised Code Modification
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.132 Unauthorised Data Access

IRI https://w3id.org/dpv/risk#UnauthorisedDataAccess
Term: UnauthorisedDataAccess
Label: Unauthorised Data Access
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.133 Unauthorised Data Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedDataDisclosure
Term: UnauthorisedDataDisclosure
Label: Unauthorised Data Disclosure
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.134 Unauthorised Data Modification

IRI https://w3id.org/dpv/risk#UnauthorisedDataModification
Term: UnauthorisedDataModification
Label: Unauthorised Data Modification
Description:
SubType of: dpv:NonMaterialDamage
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.135 Unauthorised Impersonation

IRI https://w3id.org/dpv/risk#UnauthorisedImpersonation
Term: UnauthorisedImpersonation
Label: Unauthorised Impersonation
Description:
SubType of: dpv:NonMaterialDamage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.136 Unauthorised Information Disclosure

IRI https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure
Term: UnauthorisedInformationDisclosure
Label: Unauthorised Information Disclosure
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.137 Unauthorised Re-Identification

IRI https://w3id.org/dpv/risk#UnauthorisedReIdentification
Term: UnauthorisedReIdentification
Label: Unauthorised Re-Identification
Description:
SubType of: dpv:Consequence
Created:
Contributor(s): Georg P Krog

4.1.138 Unauthorised Resource Use

IRI https://w3id.org/dpv/risk#UnauthorisedResourceUse
Term: UnauthorisedResourceUse
Label: Unauthorised Resource Use
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.139 Unauthorised System Access

IRI https://w3id.org/dpv/risk#UnauthorisedSystemAccess
Term: UnauthorisedSystemAccess
Label: Unauthorised System Access
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.140 Unauthorised System Modification

IRI https://w3id.org/dpv/risk#UnauthorisedSystemModification
Term: UnauthorisedSystemModification
Label: Unauthorised System Modification
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.141 Unknown Vulnerability Exploited

IRI https://w3id.org/dpv/risk#UnknownVulnerabilityExploited
Term: UnknownVulnerabilityExploited
Label: Unknown Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.142 Unwanted Code Deletion

IRI https://w3id.org/dpv/risk#UnwantedCodeDeletion
Term: UnwantedCodeDeletion
Label: Unwanted Code Deletion
Description:
SubType of: dpv:Damage
Source: ENISA Methodology for Sectoral Cybersecurity Assessments
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.143 Unwanted Data Deletion

IRI https://w3id.org/dpv/risk#UnwantedDataDeletion
Term: UnwantedDataDeletion
Label: Unwanted Data Deletion
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.144 Unwanted Disclosure of Data

IRI https://w3id.org/dpv/risk#UnwantedDisclosureData
Term: UnwantedDisclosureData
Label: Unwanted Disclosure of Data
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.145 Vandalism

IRI https://w3id.org/dpv/risk#Vandalism
Term: Vandalism
Label: Vandalism
Description:
SubType of: dpv:Damage
Source: ENISA Threat Taxonomy 2016
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.146 Violation of Code of Conduct

IRI https://w3id.org/dpv/risk#ViolationCodeConduct
Term: ViolationCodeConduct
Label: Violation of Code of Conduct
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.147 Violation of Contractual Obligations

IRI https://w3id.org/dpv/risk#ViolationContractualObligations
Term: ViolationContractualObligations
Label: Violation of Contractual Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.148 Violation of Ethical Code

IRI https://w3id.org/dpv/risk#ViolationEthicalCode
Term: ViolationEthicalCode
Label: Violation of Ethical Code
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.149 Violation of Rights

IRI https://w3id.org/dpv/risk#ViolationOfRights
Term: ViolationOfRights
Label: Violation of Rights
Description:
SubType of: dpv:Harm
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit

4.1.150 Violation of Regulatory Obligations

IRI https://w3id.org/dpv/risk#ViolationRegulatoryObligations
Term: ViolationRegulatoryObligations
Label: Violation of Regulatory Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.151 Violation of Statutory Obligations

IRI https://w3id.org/dpv/risk#ViolationStatutoryObligations
Term: ViolationStatutoryObligations
Label: Violation of Statutory Obligations
Description:
SubType of: dpv:Damage
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.152 Vulnerability Created

IRI https://w3id.org/dpv/risk#VulnerabilityCreated
Term: VulnerabilityCreated
Label: Vulnerability Created
Description:
SubType of: dpv:Detriment
Source: ISO/IEC 27005:2018
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.153 Vulnerability Exploited

IRI https://w3id.org/dpv/risk#VulnerabilityExploited
Term: VulnerabilityExploited
Label: Vulnerability Exploited
Description:
SubType of: dpv:Detriment
Source: ENISA Reference Incident Classification Taxonomy 2018
Created:
Contributor(s): Harshvardhan J. Pandit

5. Risk Assessment Techniques

5.1 Classes

ALARA | ALARP | Bayesian Analysis | Bayesian Networks | Bow Tie Analysis | Brainstorming | Business Impact Analysis | Causal Mapping | Cause-Consequence Analysis | Checklists | Cindynic Approach | Classifications | Cost/benefit Analysis | Cross Impact Analysis | Conditional Value at Risk (CVaR) | Decision Tree Analysis | Delphi Technique | Data Protection Impact Assessment (DPIA) | Event Tree Analysis | Fault Tree Analysis | Ishikawa (Fishbone) | Failure Modes And Effects Analysis (FMEA) | Failure Modes And Effects And Criticality Analysis (FMECA) | F-N Diagrams | Game Theory | Hazard Analysis And Critical Control Points (HACCP) | Hazard And Operability Studies (HAZOP) | Human Reliability Analysis | Influence Diagrams | Interviews | Layer Protection Analysis (LOPA) | Markov Analysis | Multi-criteria Analysis (MCA) | Monte Carlo Simulation | Nominal Group Technique | Pareto Charts | Privacy Impact Analysis (PIA) | Qualitative Risk Assessment Technique | Quantitative Risk Assessment Technique | Reliability Centred Maintenance | Risk Assessment Technique | Risk Indices | Risk Matrix | Risk Registers | Scenario Analysis | S-curves | SFAIRP | Surveys | Structured "What If?" (SWIFT) | Taxonomies | Toxicological Risk Assessment | Value At Risk (VaR) |

5.1.1 ALARA

IRI https://w3id.org/dpv/risk#ALARA
Term: ALARA
Label: ALARA
Description: As Low as Resonably Achievable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.2 ALARP

IRI https://w3id.org/dpv/risk#ALARP
Term: ALARP
Label: ALARP
Description: As Low as Resonably Possible (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.3 Bayesian Analysis

IRI https://w3id.org/dpv/risk#BayesianAnalysis
Term: BayesianAnalysis
Label: Bayesian Analysis
Description: A means of making inference about model parameters using Bayes' theorem which has the capability of incorporating empirical data into prior judgements about probabilities
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.4 Bayesian Networks

IRI https://w3id.org/dpv/risk#BayesianNetworks
Term: BayesianNetworks
Label: Bayesian Networks
Description: A graphical model of variables and their cause-effect relationships expressed using probabilities
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.5 Bow Tie Analysis

IRI https://w3id.org/dpv/risk#BowTie
Term: BowTie
Label: Bow Tie Analysis
Description: A diagrammatic way of describing the pathways from sources of risk to outcomes, and of reviewing controls
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.6 Brainstorming

IRI https://w3id.org/dpv/risk#Brainstorming
Term: Brainstorming
Label: Brainstorming
Description: Technique used in workshops to encourage imaginative thinking
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.7 Business Impact Analysis

IRI https://w3id.org/dpv/risk#BusinessImpactAnalysis
Term: BusinessImpactAnalysis
Label: Business Impact Analysis
Description: A process that analyses the consequences of a disruptive incident on the organization which determines the recovery priorities of an organization's products and services and, thereby, the priorities of the activities and resources which deliver them
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.8 Causal Mapping

IRI https://w3id.org/dpv/risk#CausalMapping
Term: CausalMapping
Label: Causal Mapping
Description: A network diagram representing events, causes and effects and their relationships.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.9 Cause-Consequence Analysis

IRI https://w3id.org/dpv/risk#CauseConsequenceAnalysis
Term: CauseConsequenceAnalysis
Label: Cause-Consequence Analysis
Description: A combination of fault and event tree analysis that allows inclusion of time delays. Both causes and consequences of an initiating event are considered.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.10 Checklists

IRI https://w3id.org/dpv/risk#Checklists
Term: Checklists
Label: Checklists
Description: A checklist based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.11 Cindynic Approach

IRI https://w3id.org/dpv/risk#Cindynic
Term: Cindynic
Label: Cindynic Approach
Description: Considers goals, values, rules, data and models of stakeholders and identifies inconsistencies, ambiguities, omissions and ignorance. These form systemic sources and drivers of risk.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.12 Classifications

IRI https://w3id.org/dpv/risk#Classifications
Term: Classifications
Label: Classifications
Description: A classification list based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.13 Cost/benefit Analysis

IRI https://w3id.org/dpv/risk#CostBenefitAnalysis
Term: CostBenefitAnalysis
Label: Cost/benefit Analysis
Description: Uses money as a scale for estimating positive and negative, tangible and intangible, consequences of different options.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.14 Cross Impact Analysis

IRI https://w3id.org/dpv/risk#CrossImpactAnalysis
Term: CrossImpactAnalysis
Label: Cross Impact Analysis
Description: Evaluates changes in the probability of the occurrence of a given set of events consequent on the actual occurrence of one of them.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.15 Conditional Value at Risk (CVaR)

IRI https://w3id.org/dpv/risk#CVaR
Term: CVaR
Label: Conditional Value at Risk (CVaR)
Description: A measure of the expected loss from a financial portfolio in the worst a % of cases. Also called expected shortfall (ES)
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.16 Decision Tree Analysis

IRI https://w3id.org/dpv/risk#DecisionTreeAnalysis
Term: DecisionTreeAnalysis
Label: Decision Tree Analysis
Description: Uses a tree-like representation or model of decisions and their possible consequences. Outcomes are usually expressed in monetary terms or in terms of utility.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.17 Delphi Technique

IRI https://w3id.org/dpv/risk#DelphiTechnique
Term: DelphiTechnique
Label: Delphi Technique
Description: Collects judgements through a set of sequential questionnaires. People participate individually but receive feedback on the responses of others after each set of questions.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.18 Data Protection Impact Assessment (DPIA)

IRI https://w3id.org/dpv/risk#DPIA
Term: DPIA
Label: Data Protection Impact Assessment (DPIA)
Description: Analyses how incidents and events could affect the protection of data and its effects on persons and identifies and quantifies the capabilities that would be needed to manage it.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.19 Event Tree Analysis

IRI https://w3id.org/dpv/risk#EventTreeAnalysis
Term: EventTreeAnalysis
Label: Event Tree Analysis
Description: Models the possible outcomes from a given initiating event and the status of controls thus analysing the frequency or probability of the various possible outcomes.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.20 Fault Tree Analysis

IRI https://w3id.org/dpv/risk#FaultTreeAnalysis
Term: FaultTreeAnalysis
Label: Fault Tree Analysis
Description: Analyses causes of a focus event using Boolean logic to describe combinations of faults. Variations include a success tree where the top event is desired and a cause tree used to investigate past events.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.21 Ishikawa (Fishbone)

IRI https://w3id.org/dpv/risk#Fishbone
Term: Fishbone
Label: Ishikawa (Fishbone)
Description: Identifies contributory factors to a defined outcome (wanted or unwanted). Contributory factors are usually divided into predefined categories and displayed in a tree structure or a fishbone diagram.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.22 Failure Modes And Effects Analysis (FMEA)

IRI https://w3id.org/dpv/risk#FMEA
Term: FMEA
Label: Failure Modes And Effects Analysis (FMEA)
Description: Considers the ways in which each component of a system might fail and the failure causes and effects.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.23 Failure Modes And Effects And Criticality Analysis (FMECA)

IRI https://w3id.org/dpv/risk#FMECA
Term: FMECA
Label: Failure Modes And Effects And Criticality Analysis (FMECA)
Description: Considers the ways in which each component of a system might fail and the failure causes and effects. FMEA followed by a criticality analysis which defines the significance of each failure mode (FMECA).
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.24 F-N Diagrams

IRI https://w3id.org/dpv/risk#FNDiagrams
Term: FNDiagrams
Label: F-N Diagrams
Description: Special case of quantitative consequence/likelihood graph applied to consideration of tolerability of risk to human life.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.25 Game Theory

IRI https://w3id.org/dpv/risk#GameTheory
Term: GameTheory
Label: Game Theory
Description: The study of strategic decision making to model the impact of the decisions of different players involved in the game. Example application area can be risk based pricing.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.26 Hazard Analysis And Critical Control Points (HACCP)

IRI https://w3id.org/dpv/risk#HACCP
Term: HACCP
Label: Hazard Analysis And Critical Control Points (HACCP)
Description: Analyses the risk reduction that can be achieved by various layers of protection.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.27 Hazard And Operability Studies (HAZOP)

IRI https://w3id.org/dpv/risk#HAZOP
Term: HAZOP
Label: Hazard And Operability Studies (HAZOP)
Description: A structured and systematic examination of a planned or existing process or operation in order to identify and evaluate problems that might represent risk to personnel or equipment, or prevent efficient operation
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.28 Human Reliability Analysis

IRI https://w3id.org/dpv/risk#HumanReliabilityAnalysis
Term: HumanReliabilityAnalysis
Label: Human Reliability Analysis
Description: A set of techniques for identifying the potential for human error and estimating the likelihood of failure.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.29 Influence Diagrams

IRI https://w3id.org/dpv/risk#InfluenceDiagrams
Term: InfluenceDiagrams
Label: Influence Diagrams
Description: An extended version of Bayesian networks that includes variables representing uncertainties, consequences and actions
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.30 Interviews

IRI https://w3id.org/dpv/risk#Interviews
Term: Interviews
Label: Interviews
Description: Structured or semi- structured one-to-one conversations to elicit views.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.31 Layer Protection Analysis (LOPA)

IRI https://w3id.org/dpv/risk#LOPA
Term: LOPA
Label: Layer Protection Analysis (LOPA)
Description: Analyses the risk reduction that can be achieved by various layers of protection.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.32 Markov Analysis

IRI https://w3id.org/dpv/risk#MarkovAnalysis
Term: MarkovAnalysis
Label: Markov Analysis
Description: Calculates the probability that a system that has the capacity to be in one of a number of states will be in a particular state at a time t in the future.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.33 Multi-criteria Analysis (MCA)

IRI https://w3id.org/dpv/risk#MCA
Term: MCA
Label: Multi-criteria Analysis (MCA)
Description: Compares options in a way that makes trade-offs explicit. Provides an alternative to cost/benefit analysis that does not need a monetary value to be allocated to all inputs.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.34 Monte Carlo Simulation

IRI https://w3id.org/dpv/risk#MonteCarloSimulation
Term: MonteCarloSimulation
Label: Monte Carlo Simulation
Description: Calculates the probability of outcomes by running multiple simulations using random variables.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.35 Nominal Group Technique

IRI https://w3id.org/dpv/risk#NominalGroupTechnique
Term: NominalGroupTechnique
Label: Nominal Group Technique
Description: Technique for eliciting views from a group of people where initial participation is as individuals with no interaction, then group discussion of ideas follows.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.36 Pareto Charts

IRI https://w3id.org/dpv/risk#ParetoCharts
Term: ParetoCharts
Label: Pareto Charts
Description: The Pareto principle (the 80–20 rule) states that, for many events, roughly 80 % of the effects come from 20 % of the causes.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.37 Privacy Impact Analysis (PIA)

IRI https://w3id.org/dpv/risk#PIA
Term: PIA
Label: Privacy Impact Analysis (PIA)
Description: Analyses how incidents and events could affect a person's privacy and identifies and quantifies the capabilities that would be needed to manage it.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.38 Qualitative Risk Assessment Technique

IRI https://w3id.org/dpv/risk#QualitativeRiskAssessmentTechnique
Term: QualitativeRiskAssessmentTechnique
Label: Qualitative Risk Assessment Technique
Description: A risk assessment technique that uses qualitative methods
SubType of: risk:RiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.39 Quantitative Risk Assessment Technique

IRI https://w3id.org/dpv/risk#QuantitativeRiskAssessmentTechnique
Term: QuantitativeRiskAssessmentTechnique
Label: Quantitative Risk Assessment Technique
Description: A risk assessment technique that uses quantitative methods
SubType of: risk:RiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.40 Reliability Centred Maintenance

IRI https://w3id.org/dpv/risk#ReliabilityCentredMaintenance
Term: ReliabilityCentredMaintenance
Label: Reliability Centred Maintenance
Description: A risk based assessment used to identify the appropriate maintenance tasks for a system and its components.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.41 Risk Assessment Technique

IRI https://w3id.org/dpv/risk#RiskAssessmentTechnique
Term: RiskAssessmentTechnique
Label: Risk Assessment Technique
Description: A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SubType of: dpv:RiskManagementProcedure
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.42 Risk Indices

IRI https://w3id.org/dpv/risk#RiskIndices
Term: RiskIndices
Label: Risk Indices
Description: Rates the significance of risks based on ratings applied to factors which are believed to influence the magnitude of the risk.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.43 Risk Matrix

IRI https://w3id.org/dpv/risk#RiskMatrix
Term: RiskMatrix
Label: Risk Matrix
Description: Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.44 Risk Registers

IRI https://w3id.org/dpv/risk#RiskRegisters
Term: RiskRegisters
Label: Risk Registers
Description: A means of recording information about risks and tracking actions.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.45 Scenario Analysis

IRI https://w3id.org/dpv/risk#ScenarioAnalysis
Term: ScenarioAnalysis
Label: Scenario Analysis
Description: Identifies possible future scenarios through imagination, extrapolation from the present or modelling. Risk is then considered for each of these scenarios.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.46 S-curves

IRI https://w3id.org/dpv/risk#SCurves
Term: SCurves
Label: S-curves
Description: A means of displaying the relationship between consequences and their likelihood plotted as a cumulative distribution function (S-curve).
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.47 SFAIRP

IRI https://w3id.org/dpv/risk#SFAIRP
Term: SFAIRP
Label: SFAIRP
Description: So far as is Resonably Practiceable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk
Instance of: risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.48 Surveys

IRI https://w3id.org/dpv/risk#Surveys
Term: Surveys
Label: Surveys
Description: Paper- or computer-based questionnaires to elicit views.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.49 Structured "What If?" (SWIFT)

IRI https://w3id.org/dpv/risk#SWIFT
Term: SWIFT
Label: Structured "What If?" (SWIFT)
Description: A simpler form of HAZOP with prompts of "what if" to identify deviations from the expected.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.50 Taxonomies

IRI https://w3id.org/dpv/risk#Taxonomies
Term: Taxonomies
Label: Taxonomies
Description: A taxonomy based on experience or on concepts and models that can be used to help identify risks or controls.
Instance of: risk:QualitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.51 Toxicological Risk Assessment

IRI https://w3id.org/dpv/risk#Toxicological
Term: Toxicological
Label: Toxicological Risk Assessment
Description: A series of steps taken to obtain a measure for the risk to humans or ecological systems due to exposure to chemicals.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

5.1.52 Value At Risk (VaR)

IRI https://w3id.org/dpv/risk#VaR
Term: VaR
Label: Value At Risk (VaR)
Description: Financial measure of risk that uses an assumed probability distribution of losses in a stable market condition to calculate the value of a loss that might occur with a specified probability within a defined time span.
Instance of: risk:QuantitativeRiskAssessmentTechnique
Source: IEC 31010:2019
Created:
Contributor(s): Harshvardhan J. Pandit

6. Risk Methodology

6.1 Classes

ACSC-ISM | ANSI/ISA-62443-3‑2-2020 | BSI Standard 200-2 | CCRACII | CORAS | CRAMM | EBIOS | ERM-IF | ETSI TS 102 165-1 | ITSRM² | FAIR | FAIR Privacy | GCSOS | HITRUST-CSF | IMO MSC-FAL.1/CIRC.3 | IRAM2 | IS-BM | ISACA-RISK-IT | ISAMM | ISO/IEC 27005:2018 | ISRAM | IT-Grundschutz | MAGERIT | MEHARI | MONARC | NIST SP 800-30 | NIST SP 800-37 | NIST SP 800–39 | NIST SP 800–82 | O-RA | OCTAVE | OCTAVE ALLEGRO | OCTAVE FORTE | OCTAVE-S | Risk Management Methodology |

6.1.1 ACSC-ISM

IRI https://w3id.org/dpv/risk#ACSC-ISM
Term: ACSC-ISM
Label: ACSC-ISM
Description: The Australian Cyber Security Centre (ACSC) published the Australian Government Information Security Manual (ISM) which adopts the use of a risk management framework that draws from NIST 800-37, and includes six steps: define the system, select security controls, implement security controls, assess security controls, authorise the system and monitor the system
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.2 ANSI/ISA-62443-3‑2-2020

IRI https://w3id.org/dpv/risk#ANSI-ISA-62443-3‑2-2020
Term: ANSI-ISA-62443-3‑2-2020
Label: ANSI/ISA-62443-3‑2-2020
Description: ANSI/ISA-62443-3-2-2020 standard, entitled ‘Security for industrial automation and control systems, Part 3-2: Security risk assessment for system design’, from the International Society of Automation (ISA), dedicates an entire part to the assessment of security risk for system design targeting Security and IT professionals
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.3 BSI Standard 200-2

IRI https://w3id.org/dpv/risk#BSI-200-2
Term: BSI-200-2
Label: BSI Standard 200-2
Description: The BSI-Standard 200-2 (‘IT-Grundschutz Methodology’) provides a methodology for the management of information security which can be adapted to the requirements of organisations of various types and sizes
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.4 CCRACII

IRI https://w3id.org/dpv/risk#CCRACII
Term: CCRACII
Label: CCRACII
Description: The Guide to Conducting Cybersecurity Risk Assessment for Critical Information Infrastructure (CCRACII) defines commonly used terms such as threat event, vulnerability, likelihood, impact and risk, roles, and responsibilities, in addition to a range for risk levels, ranging from low to very high with different level of risk toleranc
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.5 CORAS

IRI https://w3id.org/dpv/risk#CORAS
Term: CORAS
Label: CORAS
Description: The CORAS method was developed and is supported by SourceForge. It is a method for conducting the analysis and management of security risk. It provides a customised language for modelling threats and risks as well as detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of the security analysis
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.6 CRAMM

IRI https://w3id.org/dpv/risk#CRAMM
Term: CRAMM
Label: CRAMM
Description: CCTA Risk Assessment and Management Methodology (CRAMM) is a method that an analyst or group of analysts may use to evaluate the security and risk level of an organisation by analysing and combining the diverse knowledge distributed in the local corporate environment
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.7 EBIOS

IRI https://w3id.org/dpv/risk#EBIOS
Term: EBIOS
Label: EBIOS
Description: Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS) Risk Manager is an information security risk management method, created under the French General Secretariat of National Defence, consistent with ISO 31000 and ISO/IEC 27005, and enables the risk management requirements of ISO/IEC 27001 to be met
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.8 ERM-IF

IRI https://w3id.org/dpv/risk#ERM-IF
Term: ERM-IF
Label: ERM-IF
Description: Enterprise Risk Management - Integrated Framework (ERM-IF) defines the essential components of enterprise risk management. It is based on a set of principles and concepts for the enterprise and has as its objective to offer a common language for enterprise risk
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.9 ETSI TS 102 165-1

IRI https://w3id.org/dpv/risk#ETSI-TS-102-165-1
Term: ETSI-TS-102-165-1
Label: ETSI TS 102 165-1
Description: ETSI TS 102 165-1 offers methodology and pro-forma for threat, vulnerability and risk analysis (TVRA). According to ETSI TS 102 165-1, threat vulnerability and risk analysis (TVRA) is used to identify risk to an information system based upon the product of the likelihood of an attack and the impact that such an attack will have on the system
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.10 ITSRM²

IRI https://w3id.org/dpv/risk#EU-ITSRM
Term: EU-ITSRM
Label: ITSRM²
Description: ITSRM² IT Security Risk Management Methodology is a methodology provided by DG DIGIT and the European Commission as part of a set of standards for information security
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.11 FAIR

IRI https://w3id.org/dpv/risk#FAIR
Term: FAIR
Label: FAIR
Description: The purpose of the FAIR (Factor Analysis of Information Risk) model is to help organisations understand, analyse, and measure information risk. The model provides an approach to quantify risk and defines the necessary building blocks for implementing effective cyber risk management programmes
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.12 FAIR Privacy

IRI https://w3id.org/dpv/risk#FAIR-Privacy
Term: FAIR-Privacy
Label: FAIR Privacy
Description: Factors Analysis in Information Risk (FAIR Privacy) is a quantitative privacy risk framework based on FAIR (Factors Analysis in Information Risk) that examines personal privacy risks (to individuals), not organisational risks
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.13 GCSOS

IRI https://w3id.org/dpv/risk#GCSOS
Term: GCSOS
Label: GCSOS
Description: The Guidelines on Cyber Security Onboard Ships (GCSOS) guidelines explain why and how cyber risks should be managed in a shipping context. They outline the risk assessment process with an explanation of the part played by each component of cyber risk and offer advice on how to respond to and recover from cyber incidents
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.14 HITRUST-CSF

IRI https://w3id.org/dpv/risk#HITRUST-CSF
Term: HITRUST-CSF
Label: HITRUST-CSF
Description: The HITRUST Cyber-Security Framework (CSF) is a framework created by security industry experts to safeguard sensitive information and manage information risk for organisations across all industries and throughout the third-party supply chain
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.15 IMO MSC-FAL.1/CIRC.3

IRI https://w3id.org/dpv/risk#IMO-MSC-FAL1-CIRC3
Term: IMO-MSC-FAL1-CIRC3
Label: IMO MSC-FAL.1/CIRC.3
Description: The official International Maritime Organization guidelines IMO MSC-FAL.1/CIRC.3 provide a high-level approach to the management pf maritime cyber risk which refers to the extent a technology asset is exposed to risks during an event that could result in shipping-related operational failure
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.16 IRAM2

IRI https://w3id.org/dpv/risk#IRAM2
Term: IRAM2
Label: IRAM2
Description: Information Risk Assessment Methodology (IRAM2) supports risk assessment and treatment and entails a six-phase process, and is is implemented by an automated toolset
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.17 IS-BM

IRI https://w3id.org/dpv/risk#IS-BM
Term: IS-BM
Label: IS-BM
Description: The IS risk analysis method is based on a business model using a quantitative approach. The values of IS assets come from their importance towards operational continuity, as well as from their replacement costs
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.18 ISACA-RISK-IT

IRI https://w3id.org/dpv/risk#ISACA-RISK-IT
Term: ISACA-RISK-IT
Label: ISACA-RISK-IT
Description: The ISACA Risk IT Framework provides a set of guiding principles and supporting practices for enterprise management, combined to deliver a comprehensive process model for governing and managing IT risk
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.19 ISAMM

IRI https://w3id.org/dpv/risk#ISAMM
Term: ISAMM
Label: ISAMM
Description: Information Security Assessment and Monitoring Method (ISAMM) is a quantitative type of risk management methodology that can be applied by various organisations such as governmental agencies, large companies and small and medium size enterprises
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.20 ISO/IEC 27005:2018

IRI https://w3id.org/dpv/risk#ISO-IEC-27005-2018
Term: ISO-IEC-27005-2018
Label: ISO/IEC 27005:2018
Description: ISO/IEC 27005:2018 ‘Information technology — Security techniques — Information security risk management’ is a risk management framework applicable to all types of organisations (e.g. commercial enterprises, government agencies, non-profit organisations) which intend to manage risks that could compromise the organisation’s information security
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.21 ISRAM

IRI https://w3id.org/dpv/risk#ISRAM
Term: ISRAM
Label: ISRAM
Description: ISRAM is a quantitative, paper-based risk analysis method that is designed to allow effective participation of managers and staff in the process
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.22 IT-Grundschutz

IRI https://w3id.org/dpv/risk#IT-Grundschutz
Term: IT-Grundschutz
Label: IT-Grundschutz
Description: IT-Grundschutz has been developed by the Federal Office for Information Security in Germany. IT-Grundschutz provides a configuration for the establishment of an integrated and effective IT security managemen
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.23 MAGERIT

IRI https://w3id.org/dpv/risk#MAGERIT
Term: MAGERIT
Label: MAGERIT
Description: Method for the Harmonised Analysis of Risk (MAGERIT) is an open methodology for risk analysis and management developed by the Spanish Higher Council for Electronic Government and offered as a framework and guide to the public administration
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.24 MEHARI

IRI https://w3id.org/dpv/risk#MEHARI
Term: MEHARI
Label: MEHARI
Description: MEHARI is a free of charge qualitative risk analysis and management method developed by CLUSIF (Club for the Security of Information in France/Club de la Sécurité de l'Information Français)
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.25 MONARC

IRI https://w3id.org/dpv/risk#MONARC
Term: MONARC
Label: MONARC
Description: MONARC (Méthode Optimisée d’analyse des risques CASES – ‘Method for an Optimised Analysis of Risks by CASES’ is a tool and a method allowing precise and repeatable risk assessments to take place
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.26 NIST SP 800-30

IRI https://w3id.org/dpv/risk#NIST-SP-800-30
Term: NIST-SP-800-30
Label: NIST SP 800-30
Description: NIST 800-30 is a free guide that provides a foundation for the development of an effective risk management programme, containing both the definitions and the practical guidance necessary for assessing and mitigating risks identified within IT systems
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.27 NIST SP 800-37

IRI https://w3id.org/dpv/risk#NIST-SP-800-37
Term: NIST-SP-800-37
Label: NIST SP 800-37
Description: NIST SP 800-37 Rev. 2 is an asset-based RMF which comprises 7 steps, namely Prepare, Categorise, Select, Implement, Assess, Authorise and Monitor. It does not adopt a specific risk assessment methodology, although the NIST 800-30 guide is extensively referenced
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.28 NIST SP 800–39

IRI https://w3id.org/dpv/risk#NIST-SP-800-39
Term: NIST-SP-800-39
Label: NIST SP 800–39
Description: The purpose of NIST SP 800-39 is to provide a structured, yet flexible approach for an integrated, enterprise-wide programme for managing the risk to information security of organisational operations (i.e. mission, functions, image, and reputation) and assets, individuals, other organisations etc. on an ongoing basis
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.29 NIST SP 800–82

IRI https://w3id.org/dpv/risk#NIST-SP-800-82
Term: NIST-SP-800-82
Label: NIST SP 800–82
Description: NIST SP 800-82 Rev. 2 (Stouffer, et al., 2015), entitled ‘Guide to industrial control systems (ISC) security’, is an Industrial Control Systems Security Guide
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.30 O-RA

IRI https://w3id.org/dpv/risk#O-RA
Term: O-RA
Label: O-RA
Description: The Open Group Standard for Risk Analysis (O-RA) provides a set of standards for various aspects of information security risk analysis that is based on the Open FAIR framework and can be applied to any risk scenario
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.31 OCTAVE

IRI https://w3id.org/dpv/risk#OCTAVE
Term: OCTAVE
Label: OCTAVE
Description: Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a free of charge approach to evaluations of information security risk that is comprehensive, systematic, context-driven, and self-directed
Instance of: risk:RiskManagementMethodology
Source: ENISA Risk Management Standards
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.32 OCTAVE ALLEGRO

IRI https://w3id.org/dpv/risk#OCTAVE-ALLEGRO
Term: OCTAVE-ALLEGRO
Label: OCTAVE ALLEGRO
Description: OCTAVE Allegro is designed to allow broad assessment of an organisation’s operational risk environment, with the goal of producing robust results without the need for extensive knowledge of risk assessment
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.33 OCTAVE FORTE

IRI https://w3id.org/dpv/risk#OCTAVE-FORTE
Term: OCTAVE-FORTE
Label: OCTAVE FORTE
Description: The OCTAVE FORTE process model was developed to support organisations in evaluating their security risks. It applies Enterprise Risk Management (ERM) principles to bridge the gap between executives and practitioners acting as decision makers
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.34 OCTAVE-S

IRI https://w3id.org/dpv/risk#OCTAVE-S
Term: OCTAVE-S
Label: OCTAVE-S
Description: The OCTAVE-S is based on the OCTAVE approach and is a self-directed approach, meaning that people from an organisation assume responsibility for setting the organisation’s security strategy
Instance of: risk:RiskManagementMethodology
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.35 Risk Management Methodology

IRI https://w3id.org/dpv/risk#RiskManagementMethodology
Term: RiskManagementMethodology
Label: Risk Management Methodology
Description: A risk management framework or methodology addresses the main functional components related to identification, assessment, treatment, and monitoring regarding risks
SubType of: dpv:RiskManagementProcedure
Source: ENISA Compendium of Risk Management Frameworks with Potential Interoperability
Created:
Contributor(s): Harshvardhan J. Pandit

7. RiskMatrix

7.1 Classes

Risk Matrix 3x3 | Risk Matrix 5x5 | Risk Matrix 7x7 | Low Risk (RM3x3 S:1 L:1) | Low Risk (RM3x3 S:1 L:2) | Moderate Risk (RM3x3 S:1 L:3) | Low Risk (RM3x3 S:2 L:1) | Moderate Risk (RM3x3 S:2 L:2) | High Risk (RM3x3 S:2 L:3) | Moderate Risk (RM3x3 S:3 L:1) | High Risk (RM3x3 S:3 L:2) | High Risk (RM3x3 S:3 L:3) | Very Low Risk (RM5x5 S:1 L:1) | Very Low Risk (RM5x5 S:1 L:2) | Very Low Risk (RM5x5 S:1 L:3) | Low Risk (RM5x5 S:1 L:4) | Low Risk (RM5x5 S:1 L:5) | Very Low Risk (RM5x5 S:2 L:1) | Low Risk (RM5x5 S:2 L:2) | Moderate Risk (RM5x5 S:2 L:3) | Moderate Risk (RM5x5 S:2 L:4) | High Risk (RM5x5 S:2 L:5) | Very Low Risk (RM5x5 S:3 L:1) | Moderate Risk (RM5x5 S:3 L:2) | Moderate Risk (RM5x5 S:3 L:3) | High Risk (RM5x5 S:3 L:4) | Very High Risk (RM5x5 S:3 L:5) | Low Risk (RM5x5 S:4 L:1) | Moderate Risk (RM5x5 S:4 L:2) | High Risk (RM5x5 S:4 L:3) | Very High Risk (RM5x5 S:4 L:4) | Very High Risk (RM5x5 S:4 L:5) | Low Risk (RM5x5 S:5 L:1) | High Risk (RM5x5 S:5 L:2) | High Risk (RM5x5 S:5 L:3) | Very High Risk (RM5x5 S:5 L:4) | Very High Risk (RM5x5 S:5 L:5) | Extremely Low Risk (RM7x7 S:1 L:1) | Extremely Low Risk (RM7x7 S:1 L:2) | Extremely Low Risk (RM7x7 S:1 L:3) | Very Low Risk (RM7x7 S:1 L:4) | Very Low Risk (RM7x7 S:1 L:5) | Very Low Risk (RM7x7 S:1 L:6) | Low Risk (RM7x7 S:1 L:7) | Extremely Low Risk (RM7x7 S:2 L:1) | Extremely Low Risk (RM7x7 S:2 L:2) | Very Low Risk (RM7x7 S:2 L:3) | Low Risk (RM7x7 S:2 L:4) | Low Risk (RM7x7 S:2 L:5) | Moderate Risk (RM7x7 S:2 L:6) | Moderate Risk (RM7x7 S:2 L:7) | Extremely Low Risk (RM7x7 S:3 L:1) | Very Low Risk (RM7x7 S:3 L:2) | Low Risk (RM7x7 S:3 L:3) | Moderate Risk (RM7x7 S:3 L:4) | High Risk (RM7x7 S:3 L:5) | High Risk (RM7x7 S:3 L:6) | Very High Risk (RM7x7 S:3 L:7) | Extremely Low Risk (RM7x7 S:4 L:1) | Low Risk (RM7x7 S:4 L:2) | Moderate Risk (RM7x7 S:4 L:3) | High Risk (RM7x7 S:4 L:4) | High Risk (RM7x7 S:4 L:5) | Very High Risk (RM7x7 S:4 L:6) | Very High Risk (RM7x7 S:4 L:7) | Very Low Risk (RM7x7 S:5 L:1) | Low Risk (RM7x7 S:5 L:2) | Moderate Risk (RM7x7 S:5 L:3) | High Risk (RM7x7 S:5 L:4) | Very High Risk (RM7x7 S:5 L:5) | Extremely High Risk (RM7x7 S:5 L:6) | Extremely High Risk (RM7x7 S:5 L:7) | Very Low Risk (RM7x7 S:6 L:1) | Moderate Risk (RM7x7 S:6 L:2) | High Risk (RM7x7 S:6 L:3) | Very High Risk (RM7x7 S:6 L:4) | Very High Risk (RM7x7 S:6 L:5) | Extremely High Risk (RM7x7 S:6 L:6) | Extremely High Risk (RM7x7 S:6 L:7) | Low Risk (RM7x7 S:7 L:1) | Moderate Risk (RM7x7 S:7 L:2) | High Risk (RM7x7 S:7 L:3) | Very High Risk (RM7x7 S:7 L:4) | Extremely High Risk (RM7x7 S:7 L:5) | Extremely High Risk (RM7x7 S:7 L:6) | Extremely High Risk (RM7x7 S:7 L:7) |

7.1.1 Risk Matrix 3x3

IRI https://w3id.org/dpv/risk#RiskMatrix3x3
Term: RiskMatrix3x3
Label: Risk Matrix 3x3
Description: A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.2 Risk Matrix 5x5

IRI https://w3id.org/dpv/risk#RiskMatrix5x5
Term: RiskMatrix5x5
Label: Risk Matrix 5x5
Description: A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.3 Risk Matrix 7x7

IRI https://w3id.org/dpv/risk#RiskMatrix7x7
Term: RiskMatrix7x7
Label: Risk Matrix 7x7
Description: A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
SubType of: risk:RiskMatrix
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.4 Low Risk (RM3x3 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S1L1
Term: RM3x3S1L1
Label: Low Risk (RM3x3 S:1 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.11
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.5 Low Risk (RM3x3 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S1L2
Term: RM3x3S1L2
Label: Low Risk (RM3x3 S:1 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.22
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.6 Moderate Risk (RM3x3 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S1L3
Term: RM3x3S1L3
Label: Moderate Risk (RM3x3 S:1 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.33
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.7 Low Risk (RM3x3 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S2L1
Term: RM3x3S2L1
Label: Low Risk (RM3x3 S:2 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix3x3
rdf:value 0.22
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.8 Moderate Risk (RM3x3 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S2L2
Term: RM3x3S2L2
Label: Moderate Risk (RM3x3 S:2 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.44
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.9 High Risk (RM3x3 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S2L3
Term: RM3x3S2L3
Label: High Risk (RM3x3 S:2 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 0.67
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.10 Moderate Risk (RM3x3 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM3x3S3L1
Term: RM3x3S3L1
Label: Moderate Risk (RM3x3 S:3 L:1)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix3x3
rdf:value 0.33
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.11 High Risk (RM3x3 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM3x3S3L2
Term: RM3x3S3L2
Label: High Risk (RM3x3 S:3 L:2)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 0.67
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.12 High Risk (RM3x3 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM3x3S3L3
Term: RM3x3S3L3
Label: High Risk (RM3x3 S:3 L:3)
Description: Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix3x3
rdf:value 1.00
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.13 Very Low Risk (RM5x5 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S1L1
Term: RM5x5S1L1
Label: Very Low Risk (RM5x5 S:1 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.04
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.14 Very Low Risk (RM5x5 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S1L2
Term: RM5x5S1L2
Label: Very Low Risk (RM5x5 S:1 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.08
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.15 Very Low Risk (RM5x5 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S1L3
Term: RM5x5S1L3
Label: Very Low Risk (RM5x5 S:1 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.12
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.16 Low Risk (RM5x5 S:1 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S1L4
Term: RM5x5S1L4
Label: Low Risk (RM5x5 S:1 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.17 Low Risk (RM5x5 S:1 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S1L5
Term: RM5x5S1L5
Label: Low Risk (RM5x5 S:1 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.20
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.18 Very Low Risk (RM5x5 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S2L1
Term: RM5x5S2L1
Label: Very Low Risk (RM5x5 S:2 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.08
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.19 Low Risk (RM5x5 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S2L2
Term: RM5x5S2L2
Label: Low Risk (RM5x5 S:2 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.20 Moderate Risk (RM5x5 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S2L3
Term: RM5x5S2L3
Label: Moderate Risk (RM5x5 S:2 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.24
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.21 Moderate Risk (RM5x5 S:2 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S2L4
Term: RM5x5S2L4
Label: Moderate Risk (RM5x5 S:2 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.32
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.22 High Risk (RM5x5 S:2 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S2L5
Term: RM5x5S2L5
Label: High Risk (RM5x5 S:2 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.40
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.23 Very Low Risk (RM5x5 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S3L1
Term: RM5x5S3L1
Label: Very Low Risk (RM5x5 S:3 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix5x5
rdf:value 0.12
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.24 Moderate Risk (RM5x5 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S3L2
Term: RM5x5S3L2
Label: Moderate Risk (RM5x5 S:3 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.24
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.25 Moderate Risk (RM5x5 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S3L3
Term: RM5x5S3L3
Label: Moderate Risk (RM5x5 S:3 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.36
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.26 High Risk (RM5x5 S:3 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S3L4
Term: RM5x5S3L4
Label: High Risk (RM5x5 S:3 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.48
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.27 Very High Risk (RM5x5 S:3 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S3L5
Term: RM5x5S3L5
Label: Very High Risk (RM5x5 S:3 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.60
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.28 Low Risk (RM5x5 S:4 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S4L1
Term: RM5x5S4L1
Label: Low Risk (RM5x5 S:4 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.29 Moderate Risk (RM5x5 S:4 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S4L2
Term: RM5x5S4L2
Label: Moderate Risk (RM5x5 S:4 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix5x5
rdf:value 0.32
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.30 High Risk (RM5x5 S:4 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S4L3
Term: RM5x5S4L3
Label: High Risk (RM5x5 S:4 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.48
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.31 Very High Risk (RM5x5 S:4 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S4L4
Term: RM5x5S4L4
Label: Very High Risk (RM5x5 S:4 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.64
dpv:hasSeverityrisk:HighSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.32 Very High Risk (RM5x5 S:4 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S4L5
Term: RM5x5S4L5
Label: Very High Risk (RM5x5 S:4 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.80
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.33 Low Risk (RM5x5 S:5 L:1)

IRI https://w3id.org/dpv/risk#RM5x5S5L1
Term: RM5x5S5L1
Label: Low Risk (RM5x5 S:5 L:1)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix5x5
rdf:value 0.20
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.34 High Risk (RM5x5 S:5 L:2)

IRI https://w3id.org/dpv/risk#RM5x5S5L2
Term: RM5x5S5L2
Label: High Risk (RM5x5 S:5 L:2)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.40
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.35 High Risk (RM5x5 S:5 L:3)

IRI https://w3id.org/dpv/risk#RM5x5S5L3
Term: RM5x5S5L3
Label: High Risk (RM5x5 S:5 L:3)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix5x5
rdf:value 0.60
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.36 Very High Risk (RM5x5 S:5 L:4)

IRI https://w3id.org/dpv/risk#RM5x5S5L4
Term: RM5x5S5L4
Label: Very High Risk (RM5x5 S:5 L:4)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 0.80
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.37 Very High Risk (RM5x5 S:5 L:5)

IRI https://w3id.org/dpv/risk#RM5x5S5L5
Term: RM5x5S5L5
Label: Very High Risk (RM5x5 S:5 L:5)
Description: Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix5x5
rdf:value 1.00
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.38 Extremely Low Risk (RM7x7 S:1 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S1L1
Term: RM7x7S1L1
Label: Extremely Low Risk (RM7x7 S:1 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.02
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.39 Extremely Low Risk (RM7x7 S:1 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S1L2
Term: RM7x7S1L2
Label: Extremely Low Risk (RM7x7 S:1 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.04
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:ExtremelyLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.40 Extremely Low Risk (RM7x7 S:1 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S1L3
Term: RM7x7S1L3
Label: Extremely Low Risk (RM7x7 S:1 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Low; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.06
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.41 Very Low Risk (RM7x7 S:1 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S1L4
Term: RM7x7S1L4
Label: Very Low Risk (RM7x7 S:1 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Moderate; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.42 Very Low Risk (RM7x7 S:1 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S1L5
Term: RM7x7S1L5
Label: Very Low Risk (RM7x7 S:1 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: High; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.10
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.43 Very Low Risk (RM7x7 S:1 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S1L6
Term: RM7x7S1L6
Label: Very Low Risk (RM7x7 S:1 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryHigh; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasSeverityrisk:ExtremelyLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.44 Low Risk (RM7x7 S:1 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S1L7
Term: RM7x7S1L7
Label: Low Risk (RM7x7 S:1 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyHigh; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.14
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:LowRisk
dpv:hasSeverityrisk:ExtremelyLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.45 Extremely Low Risk (RM7x7 S:2 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S2L1
Term: RM7x7S2L1
Label: Extremely Low Risk (RM7x7 S:2 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.04
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.46 Extremely Low Risk (RM7x7 S:2 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S2L2
Term: RM7x7S2L2
Label: Extremely Low Risk (RM7x7 S:2 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.47 Very Low Risk (RM7x7 S:2 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S2L3
Term: RM7x7S2L3
Label: Very Low Risk (RM7x7 S:2 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.48 Low Risk (RM7x7 S:2 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S2L4
Term: RM7x7S2L4
Label: Low Risk (RM7x7 S:2 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.16
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.49 Low Risk (RM7x7 S:2 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S2L5
Term: RM7x7S2L5
Label: Low Risk (RM7x7 S:2 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.20
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.50 Moderate Risk (RM7x7 S:2 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S2L6
Term: RM7x7S2L6
Label: Moderate Risk (RM7x7 S:2 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:VeryHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.51 Moderate Risk (RM7x7 S:2 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S2L7
Term: RM7x7S2L7
Label: Moderate Risk (RM7x7 S:2 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyHigh; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.29
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasSeverityrisk:VeryLowSeverity
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.52 Extremely Low Risk (RM7x7 S:3 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S3L1
Term: RM7x7S3L1
Label: Extremely Low Risk (RM7x7 S:3 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.06
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.53 Very Low Risk (RM7x7 S:3 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S3L2
Term: RM7x7S3L2
Label: Very Low Risk (RM7x7 S:3 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.54 Low Risk (RM7x7 S:3 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S3L3
Term: RM7x7S3L3
Label: Low Risk (RM7x7 S:3 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.18
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.55 Moderate Risk (RM7x7 S:3 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S3L4
Term: RM7x7S3L4
Label: Moderate Risk (RM7x7 S:3 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.56 High Risk (RM7x7 S:3 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S3L5
Term: RM7x7S3L5
Label: High Risk (RM7x7 S:3 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.31
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:LowSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.57 High Risk (RM7x7 S:3 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S3L6
Term: RM7x7S3L6
Label: High Risk (RM7x7 S:3 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.37
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasSeverityrisk:LowSeverity
dpv:hasRiskLevelrisk:HighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.58 Very High Risk (RM7x7 S:3 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S3L7
Term: RM7x7S3L7
Label: Very High Risk (RM7x7 S:3 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.43
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:LowSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.59 Extremely Low Risk (RM7x7 S:4 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S4L1
Term: RM7x7S4L1
Label: Extremely Low Risk (RM7x7 S:4 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.08
dpv:hasRiskLevelrisk:ExtremelyLowRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.60 Low Risk (RM7x7 S:4 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S4L2
Term: RM7x7S4L2
Label: Low Risk (RM7x7 S:4 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.16
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:LowRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.61 Moderate Risk (RM7x7 S:4 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S4L3
Term: RM7x7S4L3
Label: Moderate Risk (RM7x7 S:4 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.62 High Risk (RM7x7 S:4 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S4L4
Term: RM7x7S4L4
Label: High Risk (RM7x7 S:4 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.33
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ModerateLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.63 High Risk (RM7x7 S:4 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S4L5
Term: RM7x7S4L5
Label: High Risk (RM7x7 S:4 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.41
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.64 Very High Risk (RM7x7 S:4 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S4L6
Term: RM7x7S4L6
Label: Very High Risk (RM7x7 S:4 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.49
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:ModerateSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.65 Very High Risk (RM7x7 S:4 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S4L7
Term: RM7x7S4L7
Label: Very High Risk (RM7x7 S:4 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.57
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasSeverityrisk:ModerateSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.66 Very Low Risk (RM7x7 S:5 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S5L1
Term: RM7x7S5L1
Label: Very Low Risk (RM7x7 S:5 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.10
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.67 Low Risk (RM7x7 S:5 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S5L2
Term: RM7x7S5L2
Label: Low Risk (RM7x7 S:5 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.20
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.68 Moderate Risk (RM7x7 S:5 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S5L3
Term: RM7x7S5L3
Label: Moderate Risk (RM7x7 S:5 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.31
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.69 High Risk (RM7x7 S:5 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S5L4
Term: RM7x7S5L4
Label: High Risk (RM7x7 S:5 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.41
dpv:hasRiskLevelrisk:HighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.70 Very High Risk (RM7x7 S:5 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S5L5
Term: RM7x7S5L5
Label: Very High Risk (RM7x7 S:5 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.51
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.71 Extremely High Risk (RM7x7 S:5 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S5L6
Term: RM7x7S5L6
Label: Extremely High Risk (RM7x7 S:5 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.61
dpv:hasSeverityrisk:HighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.72 Extremely High Risk (RM7x7 S:5 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S5L7
Term: RM7x7S5L7
Label: Extremely High Risk (RM7x7 S:5 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.71
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasSeverityrisk:HighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.73 Very Low Risk (RM7x7 S:6 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S6L1
Term: RM7x7S6L1
Label: Very Low Risk (RM7x7 S:6 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyLow; and Risk Level: VeryLow
Instance of: risk:RiskMatrix7x7
rdf:value 0.12
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasRiskLevelrisk:VeryLowRisk
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.74 Moderate Risk (RM7x7 S:6 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S6L2
Term: RM7x7S6L2
Label: Moderate Risk (RM7x7 S:6 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.24
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasRiskLevelrisk:ModerateRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.75 High Risk (RM7x7 S:6 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S6L3
Term: RM7x7S6L3
Label: High Risk (RM7x7 S:6 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.37
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:LowLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.76 Very High Risk (RM7x7 S:6 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S6L4
Term: RM7x7S6L4
Label: Very High Risk (RM7x7 S:6 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.49
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.77 Very High Risk (RM7x7 S:6 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S6L5
Term: RM7x7S6L5
Label: Very High Risk (RM7x7 S:6 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.61
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.78 Extremely High Risk (RM7x7 S:6 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S6L6
Term: RM7x7S6L6
Label: Extremely High Risk (RM7x7 S:6 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.73
dpv:hasSeverityrisk:VeryHighSeverity
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.79 Extremely High Risk (RM7x7 S:6 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S6L7
Term: RM7x7S6L7
Label: Extremely High Risk (RM7x7 S:6 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.86
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasSeverityrisk:VeryHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.80 Low Risk (RM7x7 S:7 L:1)

IRI https://w3id.org/dpv/risk#RM7x7S7L1
Term: RM7x7S7L1
Label: Low Risk (RM7x7 S:7 L:1)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyLow; and Risk Level: Low
Instance of: risk:RiskMatrix7x7
rdf:value 0.14
dpv:hasLikelihoodrisk:ExtremelyLowLikelihood
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasRiskLevelrisk:LowRisk
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.81 Moderate Risk (RM7x7 S:7 L:2)

IRI https://w3id.org/dpv/risk#RM7x7S7L2
Term: RM7x7S7L2
Label: Moderate Risk (RM7x7 S:7 L:2)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryLow; and Risk Level: Moderate
Instance of: risk:RiskMatrix7x7
rdf:value 0.29
dpv:hasRiskLevelrisk:ModerateRisk
dpv:hasLikelihoodrisk:VeryLowLikelihood
dpv:hasSeverityrisk:ExtremelyHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.82 High Risk (RM7x7 S:7 L:3)

IRI https://w3id.org/dpv/risk#RM7x7S7L3
Term: RM7x7S7L3
Label: High Risk (RM7x7 S:7 L:3)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Low; and Risk Level: High
Instance of: risk:RiskMatrix7x7
rdf:value 0.43
dpv:hasLikelihoodrisk:LowLikelihood
dpv:hasRiskLevelrisk:HighRisk
dpv:hasSeverityrisk:ExtremelyHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.83 Very High Risk (RM7x7 S:7 L:4)

IRI https://w3id.org/dpv/risk#RM7x7S7L4
Term: RM7x7S7L4
Label: Very High Risk (RM7x7 S:7 L:4)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Moderate; and Risk Level: VeryHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.57
dpv:hasRiskLevelrisk:VeryHighRisk
dpv:hasLikelihoodrisk:ModerateLikelihood
dpv:hasSeverityrisk:ExtremelyHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.84 Extremely High Risk (RM7x7 S:7 L:5)

IRI https://w3id.org/dpv/risk#RM7x7S7L5
Term: RM7x7S7L5
Label: Extremely High Risk (RM7x7 S:7 L:5)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: High; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.71
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasLikelihoodrisk:HighLikelihood
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.85 Extremely High Risk (RM7x7 S:7 L:6)

IRI https://w3id.org/dpv/risk#RM7x7S7L6
Term: RM7x7S7L6
Label: Extremely High Risk (RM7x7 S:7 L:6)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 0.86
dpv:hasLikelihoodrisk:VeryHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
dpv:hasSeverityrisk:ExtremelyHighSeverity
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.86 Extremely High Risk (RM7x7 S:7 L:7)

IRI https://w3id.org/dpv/risk#RM7x7S7L7
Term: RM7x7S7L7
Label: Extremely High Risk (RM7x7 S:7 L:7)
Description: Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh
Instance of: risk:RiskMatrix7x7
rdf:value 1.00
dpv:hasSeverityrisk:ExtremelyHighSeverity
dpv:hasLikelihoodrisk:ExtremelyHighLikelihood
dpv:hasRiskLevelrisk:ExtremelyHighRisk
Created:
Contributor(s): Harshvardhan J. Pandit

A. Proposed Terms

The following terms have been proposed for inclusion, and are under discussion. They are provided here for illustrative purposes and should not be considered as part of DPV.

risk_consequences

B. Issue summary

C. Funding Acknowledgements

C.1 Funding Sponsors

The DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.

Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.

C.2 Funding Acknowledgements for Contributors

The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)

D. References

D.1 Informative references

[DPV]
Data Privacy Vocabulary (DPV) Specification. URL: https://www.w3id.org/dpv
[DPV-GDPR]
DPV-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-gdpr
Guide for Consent Records using DPV. URL: https://w3id.org/dpv/guides/consent
[DPV-GUIDE-GDPR-DPIA]
Guide for GDPR DPIA's using DPV. URL: https://w3id.org/dpv/dpv-gdpr/dpia
[DPV-GUIDE-GDPR-ROPA]
Guide for GDPR ROPA's using DPV. URL: https://w3id.org/dpv/dpv-gdpr/ropa
[DPV-GUIDE-Notice]
Guide for Privacy Notices using DPV. URL: https://w3id.org/dpv/guides/notice
[DPV-GUIDE-OWL2]
Guide for using DPV in OWL2. URL: https://w3id.org/dpv/guides/dpv-owl
[DPV-GUIDE-Serialisations]
Guide on DPV's serialisations and semantics. URL: https://w3id.org/dpv/guides/serialisations
[DPV-GUIDE-SKOS]
Guide for using DPV with RDFS and SKOS. URL: https://w3id.org/dpv/guides/dpv-skos
[DPV-GUIDES]
Guidelines for Adoption and Use of DPV. URL: https://w3id.org/dpv/guides
DPV-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-legal
[DPV-NACE]
NACE Taxonomy serialised in RDFS. URL: https://www.w3id.org/dpv/dpv-nace
[DPV-OWL]
DPV-OWL: Data Privacy Vocabulary serialised in OWL2. URL: https://www.w3id.org/dpv/dpv-owl
[DPV-OWL-GDPR]
DPV-OWL-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-gdpr
DPV-OWL-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-legal
[DPV-OWL-PD]
DPV-OWL-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-owl/dpv-pd
[DPV-OWL-TECH]
DPV-OWL-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-tech
[DPV-PD]
DPV-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-pd
[DPV-Primer]
Primer for Data Privacy Vocabulary. URL: https://www.w3id.org/dpv/primer
[DPV-SKOS]
DPV-SKOS: Data Privacy Vocabulary serialised in RDFS & SKOS. URL: https://www.w3id.org/dpv/dpv-skos
[DPV-SKOS-GDPR]
DPV-SKOS-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-gdpr
DPV-SKOS-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-legal
[DPV-SKOS-PD]
DPV-SKOS-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-skos/dpv-pd
[DPV-SKOS-TECH]
DPV-SKOS-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-tech
[DPV-TECH]
DPV-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-tech
[DPVCG]
W3C Data Privacy Vocabularies and Controls Community Group (DPVCG). URL: https://www.w3.org/community/dpvcg/
[Examples]
DPV Examples. URL: https://w3id.org/dpv/examples
[RIGHTS-EU]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/rights/eu
[RIGHTS-EU-OWL]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/dpv-owl/rights/eu
[RIGHTS-EU-SKOS]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/dpv-skos/rights/eu
[RISK]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/risk
[RISK-OWL]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/dpv-owl/risk
[RISK-SKOS]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/dpv-skos/risk
[UseCases-Requirements]
DPV Use-Cases and Requirements. URL: https://w3id.org/dpv/use-cases