Copyright © 2022 the Contributors to the Risk Extension for DPV Specification, published by the Data Privacy Vocabularies and Controls Community Group under the W3C Community Contributor License Agreement (CLA). A human-readable summary is available.
Risk concepts extend the Data Privacy Vocabulary (DPV) Specification risk vocabulary to provide additional vocabularies specific to risk management, assessment, controls, and consequences.
The namespace for terms in risk is https://www.w3id.org/dpv/risk#
The suggested prefix for the namespace is risk
The risk vocabulary and its documentation is available on GitHub.
Newcomers to the DPV are strongly recommended to first read through the Primer to familiarise themselves with the semantics and concepts of DPV.
Related Links
The peer-reviewed article “Creating A Vocabulary for Data Privacy” presents a historical overview of the DPVCG, and describes the methodology and structure of the DPV along with describing its creation. An open-access version can be accessed here, here, and here.
This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Contributor License Agreement (CLA) there is a limited opt-out and other conditions apply. Learn more about W3C Community and Business Groups.
This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).
Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.
GitHub Issues are preferred for discussion of this specification.
The DPV-Risk extension https://w3id.org/dpv/risk lists risk assessments, consequences, impacts, methodologies, matrices, etc. But does not refer to other concepts in risk management (criterias, governance, sources, threats, evaluation, etc.) These should be added.
3 Likelihood Levels
|
3 Risk Levels
|
3 Severity Levels
|
5 Likelihood Levels
|
5 Risk Levels
|
5 Severity Levels
|
7 Likelihood Levels
|
7 Risk Levels
|
7 Severity Levels
|
Extremely High Likelihood
|
Extremely High Risk
|
Extremely High Severity
|
Extremely Low Likelihood
|
Extremely Low Risk
|
Extremely Low Severity
|
High Likelihood
|
High Risk
|
High Severity
|
Low Likelihood
|
Low Risk
|
Low Severity
|
Moderate Likelihood
|
Moderate Risk
|
Moderate Severity
|
Very High Likelihood
|
Very High Risk
|
Very High Severity
|
Very Low Likelihood
|
Very Low Risk
|
Very Low Severity
|
IRI | https://w3id.org/dpv/risk#3LikelihoodLevels |
Term: | 3LikelihoodLevels |
Label: | 3 Likelihood Levels |
Description: | Scale with 3 Likelihood Levels from High to Low |
SubType of: | dpv:Likelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#3RiskLevels |
Term: | 3RiskLevels |
Label: | 3 Risk Levels |
Description: | Scale with 3 Risk Levels from High to Low |
SubType of: | dpv:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#3SeverityLevels |
Term: | 3SeverityLevels |
Label: | 3 Severity Levels |
Description: | Scale with 3 Severity Levels from High to Low |
SubType of: | dpv:Severity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#5LikelihoodLevels |
Term: | 5LikelihoodLevels |
Label: | 5 Likelihood Levels |
Description: | Scale with 5 Likelihood Levels from Very High to Very Low |
SubType of: | dpv:Likelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#5RiskLevels |
Term: | 5RiskLevels |
Label: | 5 Risk Levels |
Description: | Scale with 5 Risk Levels from Very High to Very Low |
SubType of: | dpv:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#5SeverityLevels |
Term: | 5SeverityLevels |
Label: | 5 Severity Levels |
Description: | Scale with 5 Severity Levels from Very High to Very Low |
SubType of: | dpv:Severity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#7LikelihoodLevels |
Term: | 7LikelihoodLevels |
Label: | 7 Likelihood Levels |
Description: | Scale with 7 Likelihood Levels from Extremely High to Extremely Low |
SubType of: | dpv:Likelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#7RiskLevels |
Term: | 7RiskLevels |
Label: | 7 Risk Levels |
Description: | Scale with 7 Risk Levels from Extremely High to Extremely Low |
SubType of: | dpv:RiskLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#7SeverityLevels |
Term: | 7SeverityLevels |
Label: | 7 Severity Levels |
Description: | Scale with 7 Severity Levels from Extremely High to Extremely Low |
SubType of: | dpv:Severity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyHighLikelihood |
Term: | ExtremelyHighLikelihood |
Label: | Extremely High Likelihood |
Description: | Level where Likelihood is Extremely High |
Instance of: | dpv:Likelihood, risk:7LikelihoodLevels |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyHighRisk |
Term: | ExtremelyHighRisk |
Label: | Extremely High Risk |
Description: | Level where Risk is Extremely High |
Instance of: | dpv:RiskLevel, risk:7RiskLevels |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyHighSeverity |
Term: | ExtremelyHighSeverity |
Label: | Extremely High Severity |
Description: | Level where Severity is Extremely High |
Instance of: | dpv:Severity, risk:7SeverityLevels |
rdf:value | 0.99 |
Note: | The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyLowLikelihood |
Term: | ExtremelyLowLikelihood |
Label: | Extremely Low Likelihood |
Description: | Level where Likelihood is Extremely Low |
Instance of: | dpv:Likelihood, risk:7LikelihoodLevels |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyLowRisk |
Term: | ExtremelyLowRisk |
Label: | Extremely Low Risk |
Description: | Level where Risk is Extremely Low |
Instance of: | dpv:RiskLevel, risk:7RiskLevels |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ExtremelyLowSeverity |
Term: | ExtremelyLowSeverity |
Label: | Extremely Low Severity |
Description: | Level where Severity is Extremely Low |
Instance of: | dpv:Severity, risk:7SeverityLevels |
rdf:value | 0.01 |
Note: | The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HighLikelihood |
Term: | HighLikelihood |
Label: | High Likelihood |
Description: | Level where Likelihood is High |
Instance of: | dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HighRisk |
Term: | HighRisk |
Label: | High Risk |
Description: | Level where Risk is High |
Instance of: | dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HighSeverity |
Term: | HighSeverity |
Label: | High Severity |
Description: | Level where Severity is High |
Instance of: | dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels |
rdf:value | 0.75 |
Note: | The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LowLikelihood |
Term: | LowLikelihood |
Label: | Low Likelihood |
Description: | Level where Likelihood is Low |
Instance of: | dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LowRisk |
Term: | LowRisk |
Label: | Low Risk |
Description: | Level where Risk is Low |
Instance of: | dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LowSeverity |
Term: | LowSeverity |
Label: | Low Severity |
Description: | Level where Severity is Low |
Instance of: | dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels |
rdf:value | 0.25 |
Note: | The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ModerateLikelihood |
Term: | ModerateLikelihood |
Label: | Moderate Likelihood |
Description: | Level where Likelihood is Moderate |
Instance of: | dpv:Likelihood, risk:3LikelihoodLevels, risk:5LikelihoodLevels, risk:7LikelihoodLevels |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ModerateRisk |
Term: | ModerateRisk |
Label: | Moderate Risk |
Description: | Level where Risk is Moderate |
Instance of: | dpv:RiskLevel, risk:3RiskLevels, risk:5RiskLevels, risk:7RiskLevels |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ModerateSeverity |
Term: | ModerateSeverity |
Label: | Moderate Severity |
Description: | Level where Severity is Moderate |
Instance of: | dpv:Severity, risk:3SeverityLevels, risk:5SeverityLevels, risk:7SeverityLevels |
rdf:value | 0.5 |
Note: | The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryHighLikelihood |
Term: | VeryHighLikelihood |
Label: | Very High Likelihood |
Description: | Level where Likelihood is Very High |
Instance of: | dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryHighRisk |
Term: | VeryHighRisk |
Label: | Very High Risk |
Description: | Level where Risk is Very High |
Instance of: | dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryHighSeverity |
Term: | VeryHighSeverity |
Label: | Very High Severity |
Description: | Level where Severity is Very High |
Instance of: | dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels |
rdf:value | 0.9 |
Note: | The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryLowLikelihood |
Term: | VeryLowLikelihood |
Label: | Very Low Likelihood |
Description: | Level where Likelihood is Very Low |
Instance of: | dpv:Likelihood, risk:5LikelihoodLevels, risk:7LikelihoodLevels |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryLowRisk |
Term: | VeryLowRisk |
Label: | Very Low Risk |
Description: | Level where Risk is Very Low |
Instance of: | dpv:RiskLevel, risk:5RiskLevels, risk:7RiskLevels |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VeryLowSeverity |
Term: | VeryLowSeverity |
Label: | Very Low Severity |
Description: | Level where Severity is Very Low |
Instance of: | dpv:Severity, risk:5SeverityLevels, risk:7SeverityLevels |
rdf:value | 0.1 |
Note: | The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Avoid Source
|
Change Consequence
|
Change Impact
|
Control Consequence
|
Control Monitors
|
Control Risk Source
|
Halt Source
|
Monitor Consequence
|
Monitor Impact
|
Monitor Risk
|
Monitor Risk Control
|
Monitor Risk Source
|
Monitor Vulnerabilities
|
Reduce Likelihood
|
Reduce Severity
|
Remove Consequence
|
Remove Impact
|
Remove Source
|
Share Risk
|
IRI | https://w3id.org/dpv/risk#AvoidSource |
Term: | AvoidSource |
Label: | Avoid Source |
Description: | Risk Control that avoids the risk source |
SubType of: | risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ChangeConsequence |
Term: | ChangeConsequence |
Label: | Change Consequence |
Description: | Risk Control that changes Consequence |
SubType of: | risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ChangeImpact |
Term: | ChangeImpact |
Label: | Change Impact |
Description: | Risk Control that changes Impact |
SubType of: | risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ControlConsequence |
Term: | ControlConsequence |
Label: | Control Consequence |
Description: | Risk Mitigation Measure that controls the Consequences and Impacts |
SubType of: | dpv:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ControlMonitors |
Term: | ControlMonitors |
Label: | Control Monitors |
Description: | Risk Mitigation Measure that uses controls to monitor events |
SubType of: | dpv:RiskMitigationMeasure |
Note: | Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ControlRiskSource |
Term: | ControlRiskSource |
Label: | Control Risk Source |
Description: | Risk Mitigation Measure that controls the Risk Source |
SubType of: | dpv:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HaltSource |
Term: | HaltSource |
Label: | Halt Source |
Description: | Risk Control that halts the risk source or prevents it from materialising |
SubType of: | risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorConsequence |
Term: | MonitorConsequence |
Label: | Monitor Consequence |
Description: | Risk Control that monitors a Risk Consequence |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorImpact |
Term: | MonitorImpact |
Label: | Monitor Impact |
Description: | Risk Control that monitors a Risk Impact |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorRisk |
Term: | MonitorRisk |
Label: | Monitor Risk |
Description: | Risk Control that monitors a Risk |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorRiskControl |
Term: | MonitorRiskControl |
Label: | Monitor Risk Control |
Description: | Risk Control that monitors another Risk Control |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorRiskSource |
Term: | MonitorRiskSource |
Label: | Monitor Risk Source |
Description: | Risk Control that monitors a Risk Source |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonitorVulnerabilities |
Term: | MonitorVulnerabilities |
Label: | Monitor Vulnerabilities |
Description: | Risk Control that monitors a Risk Vulnerability |
SubType of: | risk:ControlMonitors |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ReduceLikelihood |
Term: | ReduceLikelihood |
Label: | Reduce Likelihood |
Description: | Risk Control that reduces the likelihood of an event |
SubType of: | dpv:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ReduceSeverity |
Term: | ReduceSeverity |
Label: | Reduce Severity |
Description: | Risk Control that reduces the severity of an event |
SubType of: | dpv:RiskMitigationMeasure |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RemoveConsequence |
Term: | RemoveConsequence |
Label: | Remove Consequence |
Description: | Risk Control that removes Consequence i.e. prevents it from materialising |
SubType of: | risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RemoveImpact |
Term: | RemoveImpact |
Label: | Remove Impact |
Description: | Risk Control that removes Impact i.e. prevents it from materialising |
SubType of: | risk:ControlConsequence |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RemoveSource |
Term: | RemoveSource |
Label: | Remove Source |
Description: | Risk Control that removes the risk source |
SubType of: | risk:ControlRiskSource |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Abusive Content Utilisation
|
Attack on Private Life
|
Authorisation Failure
|
Blackmail
|
Brute Force Authorisations
|
Business disruption
|
Business impact
|
Business Performance Impairment
|
Child Violence
|
Citizens impact
|
Coercion
|
Compliance impact
|
Compromise Account
|
Compromise Account Credentials
|
Compromise Account Security
|
Confidentiality Breach
|
Consequence for Data Subject
|
Consequence on Data Security
|
Copyright Violation
|
Corruption of Data
|
Cost of Acquisition
|
Cost of Backup
|
Cost of Configuration
|
Cost of Installation
|
Cost of Judicial Penalties
|
Cost of Judicial Proceedings
|
Cost of Operation Interruption
|
Cost of Suspended Operations
|
Cryptojacking
|
Cyber Spying
|
Cyber Stalking
|
Damage by Third Party
|
Danger to Customers
|
Danger to Personnel
|
Data Breach
|
Denial of Service Attack (DoS)
|
Detriment to Recovery
|
Discrimination
|
Distributed Denial of Service Attack (DDoS)
|
Eavesdropping
|
Economic Disadvantage
|
Environmental Safety Endangerment
|
Equipment Failure
|
Equipment Malfunction
|
Errornous System Use
|
Extorsion
|
Financial Equipment Costs
|
Financial Investigation Costs
|
Financial Loss
|
Financial Personnel Costs
|
Financial Repair Costs
|
Fraud
|
Government Crisis
|
Harmful Spech
|
Health and life impact
|
Human Errors
|
Identity Dispute
|
Identity Fraud
|
Identity Theft
|
Illegal Processing of Data
|
Impact on Data Subject
|
Impact to Rights
|
Increase Internal Cost
|
Industrial Crisis
|
Injury
|
Interception of Communications
|
Internal Operation Disruption
|
Known Vulnerability Exploited
|
Law Enforcement Adverse Effects
|
Limitation of Rights
|
Loss of Assets
|
Loss of Competitive Advantage
|
Loss of Control over Data
|
Loss of Credibility
|
Loss of Customer Confidence
|
Loss of Customers
|
Loss of Data
|
Loss of Funds
|
Loss of Goods
|
Loss of Goodwill
|
Loss of Negotiating Capacity
|
Loss of Opportunity
|
Loss of Proprietary Information
|
Loss of Reputation
|
Loss of Resources
|
Loss of Suppliers
|
Loss of Technological Advantage
|
Loss of Trust
|
Malicious Code Attack
|
Malware Attack
|
MisinformationDisinformation
|
Misuse of Breached Information
|
Organisation Disruption
|
Personal Safety Endangerment
|
Personnel Absence
|
Phishing Scam
|
Physical Assault
|
Physical Spying
|
Physical Stalking
|
Prevent Exercising of Rights
|
Privacy impact
|
Psychological Harm
|
Public Order Breach
|
RansomwareAttack
|
Remote Spying
|
Replacement Costs
|
Reputation and trust impact
|
Retrieval of Deleted Data
|
Retrieval of Discarded Equipment
|
Sabotage
|
Scam
|
Security Breach
|
Service Interruption
|
Sexual Violence
|
Social Disadvantage
|
Spam
|
Spoofing
|
Spying
|
Stalking
|
System Failure
|
System Intrusion
|
System Malfunction
|
Terrorism
|
Theft
|
Theft of Equipment
|
Theft of Media
|
Third Party Operation Disruption
|
Unauthorised Access to Premises
|
Unauthorised Code Access
|
Unauthorised Code Disclosure
|
Unauthorised Code Modification
|
Unauthorised Data Access
|
Unauthorised Data Disclosure
|
Unauthorised Data Modification
|
Unauthorised Impersonation
|
Unauthorised Information Disclosure
|
Unauthorised Re-Identification
|
Unauthorised Resource Use
|
Unauthorised System Access
|
Unauthorised System Modification
|
Unknown Vulnerability Exploited
|
Unwanted Code Deletion
|
Unwanted Data Deletion
|
Unwanted Disclosure of Data
|
Vandalism
|
Violation of Code of Conduct
|
Violation of Contractual Obligations
|
Violation of Ethical Code
|
Violation of Rights
|
Violation of Regulatory Obligations
|
Violation of Statutory Obligations
|
Vulnerability Created
|
Vulnerability Exploited
|
IRI | https://w3id.org/dpv/risk#AbusiveContentUtilisation |
Term: | AbusiveContentUtilisation |
Label: | Abusive Content Utilisation |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#AttackonPrivateLife |
Term: | AttackonPrivateLife |
Label: | Attack on Private Life |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Blackmail |
Term: | Blackmail |
Label: | Blackmail |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Businessdisruption |
Term: | Businessdisruption |
Label: | Business disruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BusinessImpact |
Term: | BusinessImpact |
Label: | Business impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BusinessPerformanceImpairment |
Term: | BusinessPerformanceImpairment |
Label: | Business Performance Impairment |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ChildViolence |
Term: | ChildViolence |
Label: | Child Violence |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CitizensImpact |
Term: | CitizensImpact |
Label: | Citizens impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Coercion |
Term: | Coercion |
Label: | Coercion |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ComplianceImpact |
Term: | ComplianceImpact |
Label: | Compliance impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CompromiseAccount |
Term: | CompromiseAccount |
Label: | Compromise Account |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CompromiseAccountCredentials |
Term: | CompromiseAccountCredentials |
Label: | Compromise Account Credentials |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CompromiseAccountSecurity |
Term: | CompromiseAccountSecurity |
Label: | Compromise Account Security |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ConfidentialityBreach |
Term: | ConfidentialityBreach |
Label: | Confidentiality Breach |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ConsequenceForDataSubject |
Term: | ConsequenceForDataSubject |
Label: | Consequence for Data Subject |
Description: | |
SubType of: | dpv:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ConsequenceOnDataSecurity |
Term: | ConsequenceOnDataSecurity |
Label: | Consequence on Data Security |
Description: | |
SubType of: | dpv:Consequence |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CopyrightViolation |
Term: | CopyrightViolation |
Label: | Copyright Violation |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CorruptionData |
Term: | CorruptionData |
Label: | Corruption of Data |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostAcquisition |
Term: | CostAcquisition |
Label: | Cost of Acquisition |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostBackup |
Term: | CostBackup |
Label: | Cost of Backup |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostConfiguration |
Term: | CostConfiguration |
Label: | Cost of Configuration |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostInstallation |
Term: | CostInstallation |
Label: | Cost of Installation |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostJudicialPenalties |
Term: | CostJudicialPenalties |
Label: | Cost of Judicial Penalties |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostJudicialProceedings |
Term: | CostJudicialProceedings |
Label: | Cost of Judicial Proceedings |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostOperationInterruption |
Term: | CostOperationInterruption |
Label: | Cost of Operation Interruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostSuspendedOperations |
Term: | CostSuspendedOperations |
Label: | Cost of Suspended Operations |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Cryptojacking |
Term: | Cryptojacking |
Label: | Cryptojacking |
Description: | Cryptojacking or hidden cryptomining is a type of cybercrime where a criminal secretly uses a victim’s computing power to generate cryptocurrency |
SubType of: | dpv:Detriment |
Source: | ENISA Threat Landscape 2021 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CyberSpying |
Term: | CyberSpying |
Label: | Cyber Spying |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CyberStalking |
Term: | CyberStalking |
Label: | Cyber Stalking |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DamageByThirdParty |
Term: | DamageByThirdParty |
Label: | Damage by Third Party |
Description: | |
SubType of: | dpv:Damage |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DangertoCustomers |
Term: | DangertoCustomers |
Label: | Danger to Customers |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DangertoPersonnel |
Term: | DangertoPersonnel |
Label: | Danger to Personnel |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DataBreach |
Term: | DataBreach |
Label: | Data Breach |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DenialServiceAttack |
Term: | DenialServiceAttack |
Label: | Denial of Service Attack (DoS) |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DetrimentToRecovery |
Term: | DetrimentToRecovery |
Label: | Detriment to Recovery |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Discrimination |
Term: | Discrimination |
Label: | Discrimination |
Description: | |
SubType of: | dpv:Harm |
Created: | |
Contributor(s): | Georg P Krog |
IRI | https://w3id.org/dpv/risk#DistributedDenialServiceAttack |
Term: | DistributedDenialServiceAttack |
Label: | Distributed Denial of Service Attack (DDoS) |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Eavesdropping |
Term: | Eavesdropping |
Label: | Eavesdropping |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EconomicDisadvantage |
Term: | EconomicDisadvantage |
Label: | Economic Disadvantage |
Description: | |
SubType of: | dpv:Impact |
Created: | |
Contributor(s): | Georg P Krog |
IRI | https://w3id.org/dpv/risk#EnvironmentalSafetyEndangerment |
Term: | EnvironmentalSafetyEndangerment |
Label: | Environmental Safety Endangerment |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EquipmentFailure |
Term: | EquipmentFailure |
Label: | Equipment Failure |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EquipmentMalfunction |
Term: | EquipmentMalfunction |
Label: | Equipment Malfunction |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ErrornousSystemUse |
Term: | ErrornousSystemUse |
Label: | Errornous System Use |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Extorsion |
Term: | Extorsion |
Label: | Extorsion |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FinancialEquipmentCosts |
Term: | FinancialEquipmentCosts |
Label: | Financial Equipment Costs |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FinancialInvestigationCosts |
Term: | FinancialInvestigationCosts |
Label: | Financial Investigation Costs |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FinancialLoss |
Term: | FinancialLoss |
Label: | Financial Loss |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FinancialPersonnelCosts |
Term: | FinancialPersonnelCosts |
Label: | Financial Personnel Costs |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FinancialRepairCosts |
Term: | FinancialRepairCosts |
Label: | Financial Repair Costs |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Fraud |
Term: | Fraud |
Label: | Fraud |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#GovernmentCrisis |
Term: | GovernmentCrisis |
Label: | Government Crisis |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HarmfulSpeech |
Term: | HarmfulSpeech |
Label: | Harmful Spech |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HealthLifeImpact |
Term: | HealthLifeImpact |
Label: | Health and life impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HumanErrors |
Term: | HumanErrors |
Label: | Human Errors |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IdentityDispute |
Term: | IdentityDispute |
Label: | Identity Dispute |
Description: | |
SubType of: | dpv:Detriment |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IdentityFraud |
Term: | IdentityFraud |
Label: | Identity Fraud |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IdentityTheft |
Term: | IdentityTheft |
Label: | Identity Theft |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IllegalProcessingData |
Term: | IllegalProcessingData |
Label: | Illegal Processing of Data |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ImpactOnDataSubject |
Term: | ImpactOnDataSubject |
Label: | Impact on Data Subject |
Description: | |
SubType of: | dpv:Impact |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ImpacttoRights |
Term: | ImpacttoRights |
Label: | Impact to Rights |
Description: | |
SubType of: | dpv:Impact |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IncreaseInternalCost |
Term: | IncreaseInternalCost |
Label: | Increase Internal Cost |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IndustrialCrisis |
Term: | IndustrialCrisis |
Label: | Industrial Crisis |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Injury |
Term: | Injury |
Label: | Injury |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#InterceptionCommunications |
Term: | InterceptionCommunications |
Label: | Interception of Communications |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#InternalOperationDisruption |
Term: | InternalOperationDisruption |
Label: | Internal Operation Disruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#KnownVulnerabilityExploited |
Term: | KnownVulnerabilityExploited |
Label: | Known Vulnerability Exploited |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LawEnforcementAdverseEffects |
Term: | LawEnforcementAdverseEffects |
Label: | Law Enforcement Adverse Effects |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LimitationOfRights |
Term: | LimitationOfRights |
Label: | Limitation of Rights |
Description: | |
SubType of: | dpv:Harm |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossAssets |
Term: | LossAssets |
Label: | Loss of Assets |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossCompetitiveAdvantage |
Term: | LossCompetitiveAdvantage |
Label: | Loss of Competitive Advantage |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossControlOverData |
Term: | LossControlOverData |
Label: | Loss of Control over Data |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossCredibility |
Term: | LossCredibility |
Label: | Loss of Credibility |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossCustomerConfidence |
Term: | LossCustomerConfidence |
Label: | Loss of Customer Confidence |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossCustomers |
Term: | LossCustomers |
Label: | Loss of Customers |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossData |
Term: | LossData |
Label: | Loss of Data |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossFunds |
Term: | LossFunds |
Label: | Loss of Funds |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossGoods |
Term: | LossGoods |
Label: | Loss of Goods |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossGoodwill |
Term: | LossGoodwill |
Label: | Loss of Goodwill |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossNegotiatingCapacity |
Term: | LossNegotiatingCapacity |
Label: | Loss of Negotiating Capacity |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossOpportunity |
Term: | LossOpportunity |
Label: | Loss of Opportunity |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossProprietaryInformation |
Term: | LossProprietaryInformation |
Label: | Loss of Proprietary Information |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossReputation |
Term: | LossReputation |
Label: | Loss of Reputation |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossResources |
Term: | LossResources |
Label: | Loss of Resources |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossSuppliers |
Term: | LossSuppliers |
Label: | Loss of Suppliers |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossTechnologicalAdvantage |
Term: | LossTechnologicalAdvantage |
Label: | Loss of Technological Advantage |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LossTrust |
Term: | LossTrust |
Label: | Loss of Trust |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MaliciousCodeAttack |
Term: | MaliciousCodeAttack |
Label: | Malicious Code Attack |
Description: | Intentional use of software by including or inserting in a system for a harmful purpose |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MalwareAttack |
Term: | MalwareAttack |
Label: | Malware Attack |
Description: | Malware is software or firmware intended to perform an unauthorised process that will have an adverse impact on the confidentiality, integrity, or availability of a system |
SubType of: | dpv:Detriment |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MisinformationDisinformation |
Term: | MisinformationDisinformation |
Label: | MisinformationDisinformation |
Description: | Information that is untrue, misleading, or false and used intentionally (disinformation) or unintentionally (misinformation) |
SubType of: | dpv:Detriment |
Source: | ENISA Threat Landscape 2021 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MisuseBreachedInformation |
Term: | MisuseBreachedInformation |
Label: | Misuse of Breached Information |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#OrganisationDisruption |
Term: | OrganisationDisruption |
Label: | Organisation Disruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PersonalSafetyEndangerment |
Term: | PersonalSafetyEndangerment |
Label: | Personal Safety Endangerment |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PersonnelAbsence |
Term: | PersonnelAbsence |
Label: | Personnel Absence |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PhishingScam |
Term: | PhishingScam |
Label: | Phishing Scam |
Description: | A type of social engineering attack involving deceptive messages intended to reveal sensitive information |
SubType of: | dpv:Harm |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PhysicalAssault |
Term: | PhysicalAssault |
Label: | Physical Assault |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PhysicalSpying |
Term: | PhysicalSpying |
Label: | Physical Spying |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PhysicalStalking |
Term: | PhysicalStalking |
Label: | Physical Stalking |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PreventExercisingOfRights |
Term: | PreventExercisingOfRights |
Label: | Prevent Exercising of Rights |
Description: | |
SubType of: | dpv:Harm |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PrivacyImpact |
Term: | PrivacyImpact |
Label: | Privacy impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PsychologicalHarm |
Term: | PsychologicalHarm |
Label: | Psychological Harm |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PublicOrderBreach |
Term: | PublicOrderBreach |
Label: | Public Order Breach |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RansomwareAttack |
Term: | RansomwareAttack |
Label: | RansomwareAttack |
Description: | Ransomware is a type of attack where threat actors take control of a target’s assets and demand a ransom in exchange for the return of the asset’s availability and confidentiality |
SubType of: | dpv:NonMaterialDamage |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022, ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RemoteSpying |
Term: | RemoteSpying |
Label: | Remote Spying |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ReplacementCosts |
Term: | ReplacementCosts |
Label: | Replacement Costs |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ReputationTrustImpact |
Term: | ReputationTrustImpact |
Label: | Reputation and trust impact |
Description: | |
SubType of: | dpv:Impact |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RetrievalDeletedData |
Term: | RetrievalDeletedData |
Label: | Retrieval of Deleted Data |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RetrievalDiscardedEquipment |
Term: | RetrievalDiscardedEquipment |
Label: | Retrieval of Discarded Equipment |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Sabotage |
Term: | Sabotage |
Label: | Sabotage |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Scam |
Term: | Scam |
Label: | Scam |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SecurityBreach |
Term: | SecurityBreach |
Label: | Security Breach |
Description: | |
SubType of: | dpv:Consequence |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ServiceInterruption |
Term: | ServiceInterruption |
Label: | Service Interruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SexualViolence |
Term: | SexualViolence |
Label: | Sexual Violence |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Spam |
Term: | Spam |
Label: | Spam |
Description: | |
SubType of: | dpv:Harm |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Spoofing |
Term: | Spoofing |
Label: | Spoofing |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Spying |
Term: | Spying |
Label: | Spying |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Stalking |
Term: | Stalking |
Label: | Stalking |
Description: | |
SubType of: | dpv:NonMaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SystemFailure |
Term: | SystemFailure |
Label: | System Failure |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Threat Landscape for Ransomware Attacks 2022 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SystemIntrusion |
Term: | SystemIntrusion |
Label: | System Intrusion |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SystemMalfunction |
Term: | SystemMalfunction |
Label: | System Malfunction |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Terrorism |
Term: | Terrorism |
Label: | Terrorism |
Description: | |
SubType of: | dpv:Harm |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Theft |
Term: | Theft |
Label: | Theft |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#TheftEquipment |
Term: | TheftEquipment |
Label: | Theft of Equipment |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#TheftMedia |
Term: | TheftMedia |
Label: | Theft of Media |
Description: | |
SubType of: | dpv:MaterialDamage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ThirdPartyOperationDisruption |
Term: | ThirdPartyOperationDisruption |
Label: | Third Party Operation Disruption |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#UnknownVulnerabilityExploited |
Term: | UnknownVulnerabilityExploited |
Label: | Unknown Vulnerability Exploited |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#UnwantedCodeDeletion |
Term: | UnwantedCodeDeletion |
Label: | Unwanted Code Deletion |
Description: | |
SubType of: | dpv:Damage |
Source: | ENISA Methodology for Sectoral Cybersecurity Assessments |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#UnwantedDataDeletion |
Term: | UnwantedDataDeletion |
Label: | Unwanted Data Deletion |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#UnwantedDisclosureData |
Term: | UnwantedDisclosureData |
Label: | Unwanted Disclosure of Data |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Vandalism |
Term: | Vandalism |
Label: | Vandalism |
Description: | |
SubType of: | dpv:Damage |
Source: | ENISA Threat Taxonomy 2016 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationCodeConduct |
Term: | ViolationCodeConduct |
Label: | Violation of Code of Conduct |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationContractualObligations |
Term: | ViolationContractualObligations |
Label: | Violation of Contractual Obligations |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationEthicalCode |
Term: | ViolationEthicalCode |
Label: | Violation of Ethical Code |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationOfRights |
Term: | ViolationOfRights |
Label: | Violation of Rights |
Description: | |
SubType of: | dpv:Harm |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationRegulatoryObligations |
Term: | ViolationRegulatoryObligations |
Label: | Violation of Regulatory Obligations |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ViolationStatutoryObligations |
Term: | ViolationStatutoryObligations |
Label: | Violation of Statutory Obligations |
Description: | |
SubType of: | dpv:Damage |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VulnerabilityCreated |
Term: | VulnerabilityCreated |
Label: | Vulnerability Created |
Description: | |
SubType of: | dpv:Detriment |
Source: | ISO/IEC 27005:2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VulnerabilityExploited |
Term: | VulnerabilityExploited |
Label: | Vulnerability Exploited |
Description: | |
SubType of: | dpv:Detriment |
Source: | ENISA Reference Incident Classification Taxonomy 2018 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
ALARA
|
ALARP
|
Bayesian Analysis
|
Bayesian Networks
|
Bow Tie Analysis
|
Brainstorming
|
Business Impact Analysis
|
Causal Mapping
|
Cause-Consequence Analysis
|
Checklists
|
Cindynic Approach
|
Classifications
|
Cost/benefit Analysis
|
Cross Impact Analysis
|
Conditional Value at Risk (CVaR)
|
Decision Tree Analysis
|
Delphi Technique
|
Data Protection Impact Assessment (DPIA)
|
Event Tree Analysis
|
Fault Tree Analysis
|
Ishikawa (Fishbone)
|
Failure Modes And Effects Analysis (FMEA)
|
Failure Modes And Effects And Criticality Analysis (FMECA)
|
F-N Diagrams
|
Game Theory
|
Hazard Analysis And Critical Control Points (HACCP)
|
Hazard And Operability Studies (HAZOP)
|
Human Reliability Analysis
|
Influence Diagrams
|
Interviews
|
Layer Protection Analysis (LOPA)
|
Markov Analysis
|
Multi-criteria Analysis (MCA)
|
Monte Carlo Simulation
|
Nominal Group Technique
|
Pareto Charts
|
Privacy Impact Analysis (PIA)
|
Qualitative Risk Assessment Technique
|
Quantitative Risk Assessment Technique
|
Reliability Centred Maintenance
|
Risk Assessment Technique
|
Risk Indices
|
Risk Matrix
|
Risk Registers
|
Scenario Analysis
|
S-curves
|
SFAIRP
|
Surveys
|
Structured "What If?" (SWIFT)
|
Taxonomies
|
Toxicological Risk Assessment
|
Value At Risk (VaR)
|
IRI | https://w3id.org/dpv/risk#ALARA |
Term: | ALARA |
Label: | ALARA |
Description: | As Low as Resonably Achievable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ALARP |
Term: | ALARP |
Label: | ALARP |
Description: | As Low as Resonably Possible (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BayesianAnalysis |
Term: | BayesianAnalysis |
Label: | Bayesian Analysis |
Description: | A means of making inference about model parameters using Bayes' theorem which has the capability of incorporating empirical data into prior judgements about probabilities |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BayesianNetworks |
Term: | BayesianNetworks |
Label: | Bayesian Networks |
Description: | A graphical model of variables and their cause-effect relationships expressed using probabilities |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BowTie |
Term: | BowTie |
Label: | Bow Tie Analysis |
Description: | A diagrammatic way of describing the pathways from sources of risk to outcomes, and of reviewing controls |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Brainstorming |
Term: | Brainstorming |
Label: | Brainstorming |
Description: | Technique used in workshops to encourage imaginative thinking |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BusinessImpactAnalysis |
Term: | BusinessImpactAnalysis |
Label: | Business Impact Analysis |
Description: | A process that analyses the consequences of a disruptive incident on the organization which determines the recovery priorities of an organization's products and services and, thereby, the priorities of the activities and resources which deliver them |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CausalMapping |
Term: | CausalMapping |
Label: | Causal Mapping |
Description: | A network diagram representing events, causes and effects and their relationships. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CauseConsequenceAnalysis |
Term: | CauseConsequenceAnalysis |
Label: | Cause-Consequence Analysis |
Description: | A combination of fault and event tree analysis that allows inclusion of time delays. Both causes and consequences of an initiating event are considered. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Checklists |
Term: | Checklists |
Label: | Checklists |
Description: | A checklist based on experience or on concepts and models that can be used to help identify risks or controls. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Cindynic |
Term: | Cindynic |
Label: | Cindynic Approach |
Description: | Considers goals, values, rules, data and models of stakeholders and identifies inconsistencies, ambiguities, omissions and ignorance. These form systemic sources and drivers of risk. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Classifications |
Term: | Classifications |
Label: | Classifications |
Description: | A classification list based on experience or on concepts and models that can be used to help identify risks or controls. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CostBenefitAnalysis |
Term: | CostBenefitAnalysis |
Label: | Cost/benefit Analysis |
Description: | Uses money as a scale for estimating positive and negative, tangible and intangible, consequences of different options. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CrossImpactAnalysis |
Term: | CrossImpactAnalysis |
Label: | Cross Impact Analysis |
Description: | Evaluates changes in the probability of the occurrence of a given set of events consequent on the actual occurrence of one of them. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CVaR |
Term: | CVaR |
Label: | Conditional Value at Risk (CVaR) |
Description: | A measure of the expected loss from a financial portfolio in the worst a % of cases. Also called expected shortfall (ES) |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DecisionTreeAnalysis |
Term: | DecisionTreeAnalysis |
Label: | Decision Tree Analysis |
Description: | Uses a tree-like representation or model of decisions and their possible consequences. Outcomes are usually expressed in monetary terms or in terms of utility. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DelphiTechnique |
Term: | DelphiTechnique |
Label: | Delphi Technique |
Description: | Collects judgements through a set of sequential questionnaires. People participate individually but receive feedback on the responses of others after each set of questions. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#DPIA |
Term: | DPIA |
Label: | Data Protection Impact Assessment (DPIA) |
Description: | Analyses how incidents and events could affect the protection of data and its effects on persons and identifies and quantifies the capabilities that would be needed to manage it. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EventTreeAnalysis |
Term: | EventTreeAnalysis |
Label: | Event Tree Analysis |
Description: | Models the possible outcomes from a given initiating event and the status of controls thus analysing the frequency or probability of the various possible outcomes. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FaultTreeAnalysis |
Term: | FaultTreeAnalysis |
Label: | Fault Tree Analysis |
Description: | Analyses causes of a focus event using Boolean logic to describe combinations of faults. Variations include a success tree where the top event is desired and a cause tree used to investigate past events. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Fishbone |
Term: | Fishbone |
Label: | Ishikawa (Fishbone) |
Description: | Identifies contributory factors to a defined outcome (wanted or unwanted). Contributory factors are usually divided into predefined categories and displayed in a tree structure or a fishbone diagram. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FMEA |
Term: | FMEA |
Label: | Failure Modes And Effects Analysis (FMEA) |
Description: | Considers the ways in which each component of a system might fail and the failure causes and effects. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FMECA |
Term: | FMECA |
Label: | Failure Modes And Effects And Criticality Analysis (FMECA) |
Description: | Considers the ways in which each component of a system might fail and the failure causes and effects. FMEA followed by a criticality analysis which defines the significance of each failure mode (FMECA). |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FNDiagrams |
Term: | FNDiagrams |
Label: | F-N Diagrams |
Description: | Special case of quantitative consequence/likelihood graph applied to consideration of tolerability of risk to human life. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#GameTheory |
Term: | GameTheory |
Label: | Game Theory |
Description: | The study of strategic decision making to model the impact of the decisions of different players involved in the game. Example application area can be risk based pricing. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HACCP |
Term: | HACCP |
Label: | Hazard Analysis And Critical Control Points (HACCP) |
Description: | Analyses the risk reduction that can be achieved by various layers of protection. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HAZOP |
Term: | HAZOP |
Label: | Hazard And Operability Studies (HAZOP) |
Description: | A structured and systematic examination of a planned or existing process or operation in order to identify and evaluate problems that might represent risk to personnel or equipment, or prevent efficient operation |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HumanReliabilityAnalysis |
Term: | HumanReliabilityAnalysis |
Label: | Human Reliability Analysis |
Description: | A set of techniques for identifying the potential for human error and estimating the likelihood of failure. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#InfluenceDiagrams |
Term: | InfluenceDiagrams |
Label: | Influence Diagrams |
Description: | An extended version of Bayesian networks that includes variables representing uncertainties, consequences and actions |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Interviews |
Term: | Interviews |
Label: | Interviews |
Description: | Structured or semi- structured one-to-one conversations to elicit views. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#LOPA |
Term: | LOPA |
Label: | Layer Protection Analysis (LOPA) |
Description: | Analyses the risk reduction that can be achieved by various layers of protection. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MarkovAnalysis |
Term: | MarkovAnalysis |
Label: | Markov Analysis |
Description: | Calculates the probability that a system that has the capacity to be in one of a number of states will be in a particular state at a time t in the future. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MCA |
Term: | MCA |
Label: | Multi-criteria Analysis (MCA) |
Description: | Compares options in a way that makes trade-offs explicit. Provides an alternative to cost/benefit analysis that does not need a monetary value to be allocated to all inputs. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MonteCarloSimulation |
Term: | MonteCarloSimulation |
Label: | Monte Carlo Simulation |
Description: | Calculates the probability of outcomes by running multiple simulations using random variables. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#NominalGroupTechnique |
Term: | NominalGroupTechnique |
Label: | Nominal Group Technique |
Description: | Technique for eliciting views from a group of people where initial participation is as individuals with no interaction, then group discussion of ideas follows. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ParetoCharts |
Term: | ParetoCharts |
Label: | Pareto Charts |
Description: | The Pareto principle (the 80–20 rule) states that, for many events, roughly 80 % of the effects come from 20 % of the causes. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#PIA |
Term: | PIA |
Label: | Privacy Impact Analysis (PIA) |
Description: | Analyses how incidents and events could affect a person's privacy and identifies and quantifies the capabilities that would be needed to manage it. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#QualitativeRiskAssessmentTechnique |
Term: | QualitativeRiskAssessmentTechnique |
Label: | Qualitative Risk Assessment Technique |
Description: | A risk assessment technique that uses qualitative methods |
SubType of: | risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#QuantitativeRiskAssessmentTechnique |
Term: | QuantitativeRiskAssessmentTechnique |
Label: | Quantitative Risk Assessment Technique |
Description: | A risk assessment technique that uses quantitative methods |
SubType of: | risk:RiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ReliabilityCentredMaintenance |
Term: | ReliabilityCentredMaintenance |
Label: | Reliability Centred Maintenance |
Description: | A risk based assessment used to identify the appropriate maintenance tasks for a system and its components. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskAssessmentTechnique |
Term: | RiskAssessmentTechnique |
Label: | Risk Assessment Technique |
Description: | A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures |
SubType of: | dpv:RiskManagementProcedure |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskIndices |
Term: | RiskIndices |
Label: | Risk Indices |
Description: | Rates the significance of risks based on ratings applied to factors which are believed to influence the magnitude of the risk. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskMatrix |
Term: | RiskMatrix |
Label: | Risk Matrix |
Description: | Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskRegisters |
Term: | RiskRegisters |
Label: | Risk Registers |
Description: | A means of recording information about risks and tracking actions. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ScenarioAnalysis |
Term: | ScenarioAnalysis |
Label: | Scenario Analysis |
Description: | Identifies possible future scenarios through imagination, extrapolation from the present or modelling. Risk is then considered for each of these scenarios. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SCurves |
Term: | SCurves |
Label: | S-curves |
Description: | A means of displaying the relationship between consequences and their likelihood plotted as a cumulative distribution function (S-curve). |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SFAIRP |
Term: | SFAIRP |
Label: | SFAIRP |
Description: | So far as is Resonably Practiceable (ALARP) - A criteria for deciding significance of risk and means of evaluating tolerability of risk |
Instance of: | risk:QualitativeRiskAssessmentTechnique, risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Surveys |
Term: | Surveys |
Label: | Surveys |
Description: | Paper- or computer-based questionnaires to elicit views. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#SWIFT |
Term: | SWIFT |
Label: | Structured "What If?" (SWIFT) |
Description: | A simpler form of HAZOP with prompts of "what if" to identify deviations from the expected. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Taxonomies |
Term: | Taxonomies |
Label: | Taxonomies |
Description: | A taxonomy based on experience or on concepts and models that can be used to help identify risks or controls. |
Instance of: | risk:QualitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#Toxicological |
Term: | Toxicological |
Label: | Toxicological Risk Assessment |
Description: | A series of steps taken to obtain a measure for the risk to humans or ecological systems due to exposure to chemicals. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#VaR |
Term: | VaR |
Label: | Value At Risk (VaR) |
Description: | Financial measure of risk that uses an assumed probability distribution of losses in a stable market condition to calculate the value of a loss that might occur with a specified probability within a defined time span. |
Instance of: | risk:QuantitativeRiskAssessmentTechnique |
Source: | IEC 31010:2019 |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
ACSC-ISM
|
ANSI/ISA-62443-3‑2-2020
|
BSI Standard 200-2
|
CCRACII
|
CORAS
|
CRAMM
|
EBIOS
|
ERM-IF
|
ETSI TS 102 165-1
|
ITSRM²
|
FAIR
|
FAIR Privacy
|
GCSOS
|
HITRUST-CSF
|
IMO MSC-FAL.1/CIRC.3
|
IRAM2
|
IS-BM
|
ISACA-RISK-IT
|
ISAMM
|
ISO/IEC 27005:2018
|
ISRAM
|
IT-Grundschutz
|
MAGERIT
|
MEHARI
|
MONARC
|
NIST SP 800-30
|
NIST SP 800-37
|
NIST SP 800–39
|
NIST SP 800–82
|
O-RA
|
OCTAVE
|
OCTAVE ALLEGRO
|
OCTAVE FORTE
|
OCTAVE-S
|
Risk Management Methodology
|
IRI | https://w3id.org/dpv/risk#ACSC-ISM |
Term: | ACSC-ISM |
Label: | ACSC-ISM |
Description: | The Australian Cyber Security Centre (ACSC) published the Australian Government Information Security Manual (ISM) which adopts the use of a risk management framework that draws from NIST 800-37, and includes six steps: define the system, select security controls, implement security controls, assess security controls, authorise the system and monitor the system |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ANSI-ISA-62443-3‑2-2020 |
Term: | ANSI-ISA-62443-3‑2-2020 |
Label: | ANSI/ISA-62443-3‑2-2020 |
Description: | ANSI/ISA-62443-3-2-2020 standard, entitled ‘Security for industrial automation and control systems, Part 3-2: Security risk assessment for system design’, from the International Society of Automation (ISA), dedicates an entire part to the assessment of security risk for system design targeting Security and IT professionals |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#BSI-200-2 |
Term: | BSI-200-2 |
Label: | BSI Standard 200-2 |
Description: | The BSI-Standard 200-2 (‘IT-Grundschutz Methodology’) provides a methodology for the management of information security which can be adapted to the requirements of organisations of various types and sizes |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CCRACII |
Term: | CCRACII |
Label: | CCRACII |
Description: | The Guide to Conducting Cybersecurity Risk Assessment for Critical Information Infrastructure (CCRACII) defines commonly used terms such as threat event, vulnerability, likelihood, impact and risk, roles, and responsibilities, in addition to a range for risk levels, ranging from low to very high with different level of risk toleranc |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CORAS |
Term: | CORAS |
Label: | CORAS |
Description: | The CORAS method was developed and is supported by SourceForge. It is a method for conducting the analysis and management of security risk. It provides a customised language for modelling threats and risks as well as detailed guidelines explaining how the language should be used to capture and model relevant information during the various stages of the security analysis |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#CRAMM |
Term: | CRAMM |
Label: | CRAMM |
Description: | CCTA Risk Assessment and Management Methodology (CRAMM) is a method that an analyst or group of analysts may use to evaluate the security and risk level of an organisation by analysing and combining the diverse knowledge distributed in the local corporate environment |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EBIOS |
Term: | EBIOS |
Label: | EBIOS |
Description: | Expression des Besoins et Identification des Objectifs de Sécurité (EBIOS) Risk Manager is an information security risk management method, created under the French General Secretariat of National Defence, consistent with ISO 31000 and ISO/IEC 27005, and enables the risk management requirements of ISO/IEC 27001 to be met |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ERM-IF |
Term: | ERM-IF |
Label: | ERM-IF |
Description: | Enterprise Risk Management - Integrated Framework (ERM-IF) defines the essential components of enterprise risk management. It is based on a set of principles and concepts for the enterprise and has as its objective to offer a common language for enterprise risk |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ETSI-TS-102-165-1 |
Term: | ETSI-TS-102-165-1 |
Label: | ETSI TS 102 165-1 |
Description: | ETSI TS 102 165-1 offers methodology and pro-forma for threat, vulnerability and risk analysis (TVRA). According to ETSI TS 102 165-1, threat vulnerability and risk analysis (TVRA) is used to identify risk to an information system based upon the product of the likelihood of an attack and the impact that such an attack will have on the system |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#EU-ITSRM |
Term: | EU-ITSRM |
Label: | ITSRM² |
Description: | ITSRM² IT Security Risk Management Methodology is a methodology provided by DG DIGIT and the European Commission as part of a set of standards for information security |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FAIR |
Term: | FAIR |
Label: | FAIR |
Description: | The purpose of the FAIR (Factor Analysis of Information Risk) model is to help organisations understand, analyse, and measure information risk. The model provides an approach to quantify risk and defines the necessary building blocks for implementing effective cyber risk management programmes |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#FAIR-Privacy |
Term: | FAIR-Privacy |
Label: | FAIR Privacy |
Description: | Factors Analysis in Information Risk (FAIR Privacy) is a quantitative privacy risk framework based on FAIR (Factors Analysis in Information Risk) that examines personal privacy risks (to individuals), not organisational risks |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#GCSOS |
Term: | GCSOS |
Label: | GCSOS |
Description: | The Guidelines on Cyber Security Onboard Ships (GCSOS) guidelines explain why and how cyber risks should be managed in a shipping context. They outline the risk assessment process with an explanation of the part played by each component of cyber risk and offer advice on how to respond to and recover from cyber incidents |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#HITRUST-CSF |
Term: | HITRUST-CSF |
Label: | HITRUST-CSF |
Description: | The HITRUST Cyber-Security Framework (CSF) is a framework created by security industry experts to safeguard sensitive information and manage information risk for organisations across all industries and throughout the third-party supply chain |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IMO-MSC-FAL1-CIRC3 |
Term: | IMO-MSC-FAL1-CIRC3 |
Label: | IMO MSC-FAL.1/CIRC.3 |
Description: | The official International Maritime Organization guidelines IMO MSC-FAL.1/CIRC.3 provide a high-level approach to the management pf maritime cyber risk which refers to the extent a technology asset is exposed to risks during an event that could result in shipping-related operational failure |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IRAM2 |
Term: | IRAM2 |
Label: | IRAM2 |
Description: | Information Risk Assessment Methodology (IRAM2) supports risk assessment and treatment and entails a six-phase process, and is is implemented by an automated toolset |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IS-BM |
Term: | IS-BM |
Label: | IS-BM |
Description: | The IS risk analysis method is based on a business model using a quantitative approach. The values of IS assets come from their importance towards operational continuity, as well as from their replacement costs |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ISACA-RISK-IT |
Term: | ISACA-RISK-IT |
Label: | ISACA-RISK-IT |
Description: | The ISACA Risk IT Framework provides a set of guiding principles and supporting practices for enterprise management, combined to deliver a comprehensive process model for governing and managing IT risk |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ISAMM |
Term: | ISAMM |
Label: | ISAMM |
Description: | Information Security Assessment and Monitoring Method (ISAMM) is a quantitative type of risk management methodology that can be applied by various organisations such as governmental agencies, large companies and small and medium size enterprises |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ISO-IEC-27005-2018 |
Term: | ISO-IEC-27005-2018 |
Label: | ISO/IEC 27005:2018 |
Description: | ISO/IEC 27005:2018 ‘Information technology — Security techniques — Information security risk management’ is a risk management framework applicable to all types of organisations (e.g. commercial enterprises, government agencies, non-profit organisations) which intend to manage risks that could compromise the organisation’s information security |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#ISRAM |
Term: | ISRAM |
Label: | ISRAM |
Description: | ISRAM is a quantitative, paper-based risk analysis method that is designed to allow effective participation of managers and staff in the process |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#IT-Grundschutz |
Term: | IT-Grundschutz |
Label: | IT-Grundschutz |
Description: | IT-Grundschutz has been developed by the Federal Office for Information Security in Germany. IT-Grundschutz provides a configuration for the establishment of an integrated and effective IT security managemen |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MAGERIT |
Term: | MAGERIT |
Label: | MAGERIT |
Description: | Method for the Harmonised Analysis of Risk (MAGERIT) is an open methodology for risk analysis and management developed by the Spanish Higher Council for Electronic Government and offered as a framework and guide to the public administration |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MEHARI |
Term: | MEHARI |
Label: | MEHARI |
Description: | MEHARI is a free of charge qualitative risk analysis and management method developed by CLUSIF (Club for the Security of Information in France/Club de la Sécurité de l'Information Français) |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#MONARC |
Term: | MONARC |
Label: | MONARC |
Description: | MONARC (Méthode Optimisée d’analyse des risques CASES – ‘Method for an Optimised Analysis of Risks by CASES’ is a tool and a method allowing precise and repeatable risk assessments to take place |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#NIST-SP-800-30 |
Term: | NIST-SP-800-30 |
Label: | NIST SP 800-30 |
Description: | NIST 800-30 is a free guide that provides a foundation for the development of an effective risk management programme, containing both the definitions and the practical guidance necessary for assessing and mitigating risks identified within IT systems |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#NIST-SP-800-37 |
Term: | NIST-SP-800-37 |
Label: | NIST SP 800-37 |
Description: | NIST SP 800-37 Rev. 2 is an asset-based RMF which comprises 7 steps, namely Prepare, Categorise, Select, Implement, Assess, Authorise and Monitor. It does not adopt a specific risk assessment methodology, although the NIST 800-30 guide is extensively referenced |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#NIST-SP-800-39 |
Term: | NIST-SP-800-39 |
Label: | NIST SP 800–39 |
Description: | The purpose of NIST SP 800-39 is to provide a structured, yet flexible approach for an integrated, enterprise-wide programme for managing the risk to information security of organisational operations (i.e. mission, functions, image, and reputation) and assets, individuals, other organisations etc. on an ongoing basis |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#NIST-SP-800-82 |
Term: | NIST-SP-800-82 |
Label: | NIST SP 800–82 |
Description: | NIST SP 800-82 Rev. 2 (Stouffer, et al., 2015), entitled ‘Guide to industrial control systems (ISC) security’, is an Industrial Control Systems Security Guide |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#O-RA |
Term: | O-RA |
Label: | O-RA |
Description: | The Open Group Standard for Risk Analysis (O-RA) provides a set of standards for various aspects of information security risk analysis that is based on the Open FAIR framework and can be applied to any risk scenario |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#OCTAVE |
Term: | OCTAVE |
Label: | OCTAVE |
Description: | Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a free of charge approach to evaluations of information security risk that is comprehensive, systematic, context-driven, and self-directed |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Risk Management Standards |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#OCTAVE-ALLEGRO |
Term: | OCTAVE-ALLEGRO |
Label: | OCTAVE ALLEGRO |
Description: | OCTAVE Allegro is designed to allow broad assessment of an organisation’s operational risk environment, with the goal of producing robust results without the need for extensive knowledge of risk assessment |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#OCTAVE-FORTE |
Term: | OCTAVE-FORTE |
Label: | OCTAVE FORTE |
Description: | The OCTAVE FORTE process model was developed to support organisations in evaluating their security risks. It applies Enterprise Risk Management (ERM) principles to bridge the gap between executives and practitioners acting as decision makers |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#OCTAVE-S |
Term: | OCTAVE-S |
Label: | OCTAVE-S |
Description: | The OCTAVE-S is based on the OCTAVE approach and is a self-directed approach, meaning that people from an organisation assume responsibility for setting the organisation’s security strategy |
Instance of: | risk:RiskManagementMethodology |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskManagementMethodology |
Term: | RiskManagementMethodology |
Label: | Risk Management Methodology |
Description: | A risk management framework or methodology addresses the main functional components related to identification, assessment, treatment, and monitoring regarding risks |
SubType of: | dpv:RiskManagementProcedure |
Source: | ENISA Compendium of Risk Management Frameworks with Potential Interoperability |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Risk Matrix 3x3
|
Risk Matrix 5x5
|
Risk Matrix 7x7
|
Low Risk (RM3x3 S:1 L:1)
|
Low Risk (RM3x3 S:1 L:2)
|
Moderate Risk (RM3x3 S:1 L:3)
|
Low Risk (RM3x3 S:2 L:1)
|
Moderate Risk (RM3x3 S:2 L:2)
|
High Risk (RM3x3 S:2 L:3)
|
Moderate Risk (RM3x3 S:3 L:1)
|
High Risk (RM3x3 S:3 L:2)
|
High Risk (RM3x3 S:3 L:3)
|
Very Low Risk (RM5x5 S:1 L:1)
|
Very Low Risk (RM5x5 S:1 L:2)
|
Very Low Risk (RM5x5 S:1 L:3)
|
Low Risk (RM5x5 S:1 L:4)
|
Low Risk (RM5x5 S:1 L:5)
|
Very Low Risk (RM5x5 S:2 L:1)
|
Low Risk (RM5x5 S:2 L:2)
|
Moderate Risk (RM5x5 S:2 L:3)
|
Moderate Risk (RM5x5 S:2 L:4)
|
High Risk (RM5x5 S:2 L:5)
|
Very Low Risk (RM5x5 S:3 L:1)
|
Moderate Risk (RM5x5 S:3 L:2)
|
Moderate Risk (RM5x5 S:3 L:3)
|
High Risk (RM5x5 S:3 L:4)
|
Very High Risk (RM5x5 S:3 L:5)
|
Low Risk (RM5x5 S:4 L:1)
|
Moderate Risk (RM5x5 S:4 L:2)
|
High Risk (RM5x5 S:4 L:3)
|
Very High Risk (RM5x5 S:4 L:4)
|
Very High Risk (RM5x5 S:4 L:5)
|
Low Risk (RM5x5 S:5 L:1)
|
High Risk (RM5x5 S:5 L:2)
|
High Risk (RM5x5 S:5 L:3)
|
Very High Risk (RM5x5 S:5 L:4)
|
Very High Risk (RM5x5 S:5 L:5)
|
Extremely Low Risk (RM7x7 S:1 L:1)
|
Extremely Low Risk (RM7x7 S:1 L:2)
|
Extremely Low Risk (RM7x7 S:1 L:3)
|
Very Low Risk (RM7x7 S:1 L:4)
|
Very Low Risk (RM7x7 S:1 L:5)
|
Very Low Risk (RM7x7 S:1 L:6)
|
Low Risk (RM7x7 S:1 L:7)
|
Extremely Low Risk (RM7x7 S:2 L:1)
|
Extremely Low Risk (RM7x7 S:2 L:2)
|
Very Low Risk (RM7x7 S:2 L:3)
|
Low Risk (RM7x7 S:2 L:4)
|
Low Risk (RM7x7 S:2 L:5)
|
Moderate Risk (RM7x7 S:2 L:6)
|
Moderate Risk (RM7x7 S:2 L:7)
|
Extremely Low Risk (RM7x7 S:3 L:1)
|
Very Low Risk (RM7x7 S:3 L:2)
|
Low Risk (RM7x7 S:3 L:3)
|
Moderate Risk (RM7x7 S:3 L:4)
|
High Risk (RM7x7 S:3 L:5)
|
High Risk (RM7x7 S:3 L:6)
|
Very High Risk (RM7x7 S:3 L:7)
|
Extremely Low Risk (RM7x7 S:4 L:1)
|
Low Risk (RM7x7 S:4 L:2)
|
Moderate Risk (RM7x7 S:4 L:3)
|
High Risk (RM7x7 S:4 L:4)
|
High Risk (RM7x7 S:4 L:5)
|
Very High Risk (RM7x7 S:4 L:6)
|
Very High Risk (RM7x7 S:4 L:7)
|
Very Low Risk (RM7x7 S:5 L:1)
|
Low Risk (RM7x7 S:5 L:2)
|
Moderate Risk (RM7x7 S:5 L:3)
|
High Risk (RM7x7 S:5 L:4)
|
Very High Risk (RM7x7 S:5 L:5)
|
Extremely High Risk (RM7x7 S:5 L:6)
|
Extremely High Risk (RM7x7 S:5 L:7)
|
Very Low Risk (RM7x7 S:6 L:1)
|
Moderate Risk (RM7x7 S:6 L:2)
|
High Risk (RM7x7 S:6 L:3)
|
Very High Risk (RM7x7 S:6 L:4)
|
Very High Risk (RM7x7 S:6 L:5)
|
Extremely High Risk (RM7x7 S:6 L:6)
|
Extremely High Risk (RM7x7 S:6 L:7)
|
Low Risk (RM7x7 S:7 L:1)
|
Moderate Risk (RM7x7 S:7 L:2)
|
High Risk (RM7x7 S:7 L:3)
|
Very High Risk (RM7x7 S:7 L:4)
|
Extremely High Risk (RM7x7 S:7 L:5)
|
Extremely High Risk (RM7x7 S:7 L:6)
|
Extremely High Risk (RM7x7 S:7 L:7)
|
IRI | https://w3id.org/dpv/risk#RiskMatrix3x3 |
Term: | RiskMatrix3x3 |
Label: | Risk Matrix 3x3 |
Description: | A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types |
SubType of: | risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskMatrix5x5 |
Term: | RiskMatrix5x5 |
Label: | Risk Matrix 5x5 |
Description: | A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types |
SubType of: | risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RiskMatrix7x7 |
Term: | RiskMatrix7x7 |
Label: | Risk Matrix 7x7 |
Description: | A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types |
SubType of: | risk:RiskMatrix |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S1L1 |
Term: | RM3x3S1L1 |
Label: | Low Risk (RM3x3 S:1 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.11 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S1L2 |
Term: | RM3x3S1L2 |
Label: | Low Risk (RM3x3 S:1 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.22 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S1L3 |
Term: | RM3x3S1L3 |
Label: | Moderate Risk (RM3x3 S:1 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.33 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S2L1 |
Term: | RM3x3S2L1 |
Label: | Low Risk (RM3x3 S:2 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.22 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S2L2 |
Term: | RM3x3S2L2 |
Label: | Moderate Risk (RM3x3 S:2 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.44 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S2L3 |
Term: | RM3x3S2L3 |
Label: | High Risk (RM3x3 S:2 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.67 |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S3L1 |
Term: | RM3x3S3L1 |
Label: | Moderate Risk (RM3x3 S:3 L:1) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.33 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S3L2 |
Term: | RM3x3S3L2 |
Label: | High Risk (RM3x3 S:3 L:2) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 0.67 |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM3x3S3L3 |
Term: | RM3x3S3L3 |
Label: | High Risk (RM3x3 S:3 L:3) |
Description: | Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High |
Instance of: | risk:RiskMatrix3x3 |
rdf:value | 1.00 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S1L1 |
Term: | RM5x5S1L1 |
Label: | Very Low Risk (RM5x5 S:1 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.04 |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasLikelihood | risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S1L2 |
Term: | RM5x5S1L2 |
Label: | Very Low Risk (RM5x5 S:1 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.08 |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S1L3 |
Term: | RM5x5S1L3 |
Label: | Very Low Risk (RM5x5 S:1 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.12 |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasSeverity | risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S1L4 |
Term: | RM5x5S1L4 |
Label: | Low Risk (RM5x5 S:1 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S1L5 |
Term: | RM5x5S1L5 |
Label: | Low Risk (RM5x5 S:1 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Low |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.20 |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S2L1 |
Term: | RM5x5S2L1 |
Label: | Very Low Risk (RM5x5 S:2 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.08 |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasSeverity | risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S2L2 |
Term: | RM5x5S2L2 |
Label: | Low Risk (RM5x5 S:2 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasSeverity | risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S2L3 |
Term: | RM5x5S2L3 |
Label: | Moderate Risk (RM5x5 S:2 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.24 |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S2L4 |
Term: | RM5x5S2L4 |
Label: | Moderate Risk (RM5x5 S:2 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.32 |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S2L5 |
Term: | RM5x5S2L5 |
Label: | High Risk (RM5x5 S:2 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.40 |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S3L1 |
Term: | RM5x5S3L1 |
Label: | Very Low Risk (RM5x5 S:3 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.12 |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasSeverity | risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S3L2 |
Term: | RM5x5S3L2 |
Label: | Moderate Risk (RM5x5 S:3 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.24 |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S3L3 |
Term: | RM5x5S3L3 |
Label: | Moderate Risk (RM5x5 S:3 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.36 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S3L4 |
Term: | RM5x5S3L4 |
Label: | High Risk (RM5x5 S:3 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.48 |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S3L5 |
Term: | RM5x5S3L5 |
Label: | Very High Risk (RM5x5 S:3 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.60 |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S4L1 |
Term: | RM5x5S4L1 |
Label: | Low Risk (RM5x5 S:4 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.16 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S4L2 |
Term: | RM5x5S4L2 |
Label: | Moderate Risk (RM5x5 S:4 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.32 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S4L3 |
Term: | RM5x5S4L3 |
Label: | High Risk (RM5x5 S:4 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.48 |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasSeverity | risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S4L4 |
Term: | RM5x5S4L4 |
Label: | Very High Risk (RM5x5 S:4 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.64 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S4L5 |
Term: | RM5x5S4L5 |
Label: | Very High Risk (RM5x5 S:4 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.80 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S5L1 |
Term: | RM5x5S5L1 |
Label: | Low Risk (RM5x5 S:5 L:1) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Low |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.20 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasLikelihood | risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S5L2 |
Term: | RM5x5S5L2 |
Label: | High Risk (RM5x5 S:5 L:2) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.40 |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S5L3 |
Term: | RM5x5S5L3 |
Label: | High Risk (RM5x5 S:5 L:3) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: High |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.60 |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S5L4 |
Term: | RM5x5S5L4 |
Label: | Very High Risk (RM5x5 S:5 L:4) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 0.80 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasSeverity | risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM5x5S5L5 |
Term: | RM5x5S5L5 |
Label: | Very High Risk (RM5x5 S:5 L:5) |
Description: | Node in a 5x5 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix5x5 |
rdf:value | 1.00 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasLikelihood | risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L1 |
Term: | RM7x7S1L1 |
Label: | Extremely Low Risk (RM7x7 S:1 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.02 |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L2 |
Term: | RM7x7S1L2 |
Label: | Extremely Low Risk (RM7x7 S:1 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.04 |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L3 |
Term: | RM7x7S1L3 |
Label: | Extremely Low Risk (RM7x7 S:1 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Low; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.06 |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L4 |
Term: | RM7x7S1L4 |
Label: | Very Low Risk (RM7x7 S:1 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: Moderate; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasRiskLevel | risk:VeryLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L5 |
Term: | RM7x7S1L5 |
Label: | Very Low Risk (RM7x7 S:1 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: High; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.10 |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
dpv:hasRiskLevel | risk:VeryLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L6 |
Term: | RM7x7S1L6 |
Label: | Very Low Risk (RM7x7 S:1 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: VeryHigh; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasLikelihood | risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S1L7 |
Term: | RM7x7S1L7 |
Label: | Low Risk (RM7x7 S:1 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyLow; Likelihood: ExtremelyHigh; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.14 |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasSeverity | risk:ExtremelyLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L1 |
Term: | RM7x7S2L1 |
Label: | Extremely Low Risk (RM7x7 S:2 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.04 |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L2 |
Term: | RM7x7S2L2 |
Label: | Extremely Low Risk (RM7x7 S:2 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L3 |
Term: | RM7x7S2L3 |
Label: | Very Low Risk (RM7x7 S:2 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Low; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasRiskLevel | risk:VeryLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L4 |
Term: | RM7x7S2L4 |
Label: | Low Risk (RM7x7 S:2 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: Moderate; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.16 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L5 |
Term: | RM7x7S2L5 |
Label: | Low Risk (RM7x7 S:2 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: High; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.20 |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L6 |
Term: | RM7x7S2L6 |
Label: | Moderate Risk (RM7x7 S:2 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: VeryHigh; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasLikelihood | risk:VeryHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S2L7 |
Term: | RM7x7S2L7 |
Label: | Moderate Risk (RM7x7 S:2 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryLow; Likelihood: ExtremelyHigh; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.29 |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
dpv:hasSeverity | risk:VeryLowSeverity |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L1 |
Term: | RM7x7S3L1 |
Label: | Extremely Low Risk (RM7x7 S:3 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.06 |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L2 |
Term: | RM7x7S3L2 |
Label: | Very Low Risk (RM7x7 S:3 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasSeverity | risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L3 |
Term: | RM7x7S3L3 |
Label: | Low Risk (RM7x7 S:3 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.18 |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasRiskLevel | risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L4 |
Term: | RM7x7S3L4 |
Label: | Moderate Risk (RM7x7 S:3 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L5 |
Term: | RM7x7S3L5 |
Label: | High Risk (RM7x7 S:3 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.31 |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:LowSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L6 |
Term: | RM7x7S3L6 |
Label: | High Risk (RM7x7 S:3 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: VeryHigh; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.37 |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasRiskLevel | risk:HighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S3L7 |
Term: | RM7x7S3L7 |
Label: | Very High Risk (RM7x7 S:3 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.43 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:LowSeverity |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L1 |
Term: | RM7x7S4L1 |
Label: | Extremely Low Risk (RM7x7 S:4 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyLow; and Risk Level: ExtremelyLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.08 |
dpv:hasRiskLevel | risk:ExtremelyLowRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L2 |
Term: | RM7x7S4L2 |
Label: | Low Risk (RM7x7 S:4 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryLow; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.16 |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasRiskLevel | risk:LowRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L3 |
Term: | RM7x7S4L3 |
Label: | Moderate Risk (RM7x7 S:4 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L4 |
Term: | RM7x7S4L4 |
Label: | High Risk (RM7x7 S:4 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.33 |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:ModerateLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L5 |
Term: | RM7x7S4L5 |
Label: | High Risk (RM7x7 S:4 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.41 |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L6 |
Term: | RM7x7S4L6 |
Label: | Very High Risk (RM7x7 S:4 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: VeryHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.49 |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:ModerateSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S4L7 |
Term: | RM7x7S4L7 |
Label: | Very High Risk (RM7x7 S:4 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: ExtremelyHigh; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.57 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasSeverity | risk:ModerateSeverity |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L1 |
Term: | RM7x7S5L1 |
Label: | Very Low Risk (RM7x7 S:5 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.10 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
dpv:hasRiskLevel | risk:VeryLowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L2 |
Term: | RM7x7S5L2 |
Label: | Low Risk (RM7x7 S:5 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryLow; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.20 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasRiskLevel | risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L3 |
Term: | RM7x7S5L3 |
Label: | Moderate Risk (RM7x7 S:5 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.31 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L4 |
Term: | RM7x7S5L4 |
Label: | High Risk (RM7x7 S:5 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.41 |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasSeverity | risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L5 |
Term: | RM7x7S5L5 |
Label: | Very High Risk (RM7x7 S:5 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.51 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
dpv:hasSeverity | risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L6 |
Term: | RM7x7S5L6 |
Label: | Extremely High Risk (RM7x7 S:5 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.61 |
dpv:hasSeverity | risk:HighSeverity |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S5L7 |
Term: | RM7x7S5L7 |
Label: | Extremely High Risk (RM7x7 S:5 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.71 |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
dpv:hasSeverity | risk:HighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L1 |
Term: | RM7x7S6L1 |
Label: | Very Low Risk (RM7x7 S:6 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyLow; and Risk Level: VeryLow |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.12 |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
dpv:hasRiskLevel | risk:VeryLowRisk |
dpv:hasSeverity | risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L2 |
Term: | RM7x7S6L2 |
Label: | Moderate Risk (RM7x7 S:6 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryLow; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.24 |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasRiskLevel | risk:ModerateRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L3 |
Term: | RM7x7S6L3 |
Label: | High Risk (RM7x7 S:6 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Low; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.37 |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasLikelihood | risk:LowLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L4 |
Term: | RM7x7S6L4 |
Label: | Very High Risk (RM7x7 S:6 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: Moderate; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.49 |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasRiskLevel | risk:VeryHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L5 |
Term: | RM7x7S6L5 |
Label: | Very High Risk (RM7x7 S:6 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: High; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.61 |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L6 |
Term: | RM7x7S6L6 |
Label: | Extremely High Risk (RM7x7 S:6 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.73 |
dpv:hasSeverity | risk:VeryHighSeverity |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S6L7 |
Term: | RM7x7S6L7 |
Label: | Extremely High Risk (RM7x7 S:6 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: VeryHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.86 |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
dpv:hasSeverity | risk:VeryHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L1 |
Term: | RM7x7S7L1 |
Label: | Low Risk (RM7x7 S:7 L:1) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyLow; and Risk Level: Low |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.14 |
dpv:hasLikelihood | risk:ExtremelyLowLikelihood |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
dpv:hasRiskLevel | risk:LowRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L2 |
Term: | RM7x7S7L2 |
Label: | Moderate Risk (RM7x7 S:7 L:2) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryLow; and Risk Level: Moderate |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.29 |
dpv:hasRiskLevel | risk:ModerateRisk |
dpv:hasLikelihood | risk:VeryLowLikelihood |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L3 |
Term: | RM7x7S7L3 |
Label: | High Risk (RM7x7 S:7 L:3) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Low; and Risk Level: High |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.43 |
dpv:hasLikelihood | risk:LowLikelihood |
dpv:hasRiskLevel | risk:HighRisk |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L4 |
Term: | RM7x7S7L4 |
Label: | Very High Risk (RM7x7 S:7 L:4) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: Moderate; and Risk Level: VeryHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.57 |
dpv:hasRiskLevel | risk:VeryHighRisk |
dpv:hasLikelihood | risk:ModerateLikelihood |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L5 |
Term: | RM7x7S7L5 |
Label: | Extremely High Risk (RM7x7 S:7 L:5) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: High; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.71 |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
dpv:hasLikelihood | risk:HighLikelihood |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L6 |
Term: | RM7x7S7L6 |
Label: | Extremely High Risk (RM7x7 S:7 L:6) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: VeryHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 0.86 |
dpv:hasLikelihood | risk:VeryHighLikelihood |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/risk#RM7x7S7L7 |
Term: | RM7x7S7L7 |
Label: | Extremely High Risk (RM7x7 S:7 L:7) |
Description: | Node in a 7x7 Risk Matrix with Risk Severity: ExtremelyHigh; Likelihood: ExtremelyHigh; and Risk Level: ExtremelyHigh |
Instance of: | risk:RiskMatrix7x7 |
rdf:value | 1.00 |
dpv:hasSeverity | risk:ExtremelyHighSeverity |
dpv:hasLikelihood | risk:ExtremelyHighLikelihood |
dpv:hasRiskLevel | risk:ExtremelyHighRisk |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
The following terms have been proposed for inclusion, and are under discussion. They are provided here for illustrative purposes and should not be considered as part of DPV.
risk_consequencesThe DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.
Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.
The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)
4.1.115 Social Disadvantage
https://w3id.org/dpv/risk#SocialDisadvantage