Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Homework for all T7 experts

  • please "claim" a row in both tables below by replacing "xx" with your initials
  • fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
  • find the categorisation and code copied below:
Probability of occurrence Potential damage

1 == once in 10 years

2 == once in 5 years

3 == once in 2 years

4 ==once in 1 years

5 ==many times in a year

1 == Low   

2 == Medium

3 == High

4 == Very high

The "probability" table

Risk #Risk nameProb.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.


[1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5]

ExpertCGAAxxxxxxxxxxxxxxxx
1Fin GAFAM55







2Fin Technology55







3Fin Marketing45







4Fin Environmental Cost11







5Fin Funding43







6Legal Governments 32







7Legal Compatibility33







8Legal DID misuse55







9Legal User responsibility55







10Strategy Dependency55







11Strategy Intermediaries44







12Strategy Exposure55







13Strategy Usability55







14Strategy Acceptance55







15Strategy Interoperability33







16Strategy Integration33







17Strategy Ontopiness33







18Security Protecting data55







19Security Loss of Data55







20Security Darknet33







21Security Trust Infrastructure22









The "damage" table

Risk #Risk nameDam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.


[1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4]

ExpertCGAAxxxxxxxxxxxxxxxx
1Fin GAFAM44







2Fin Technology12







3Fin Marketing34







4Fin Environmental Cost11







5Fin Funding23







6Legal Governments 34







7Legal Compatibility33







8Legal DID misuse23







9Legal User responsibility33







10Strategy Dependency22







11Strategy Intermediaries33







12Strategy Exposure14







13Strategy Usability23







14Strategy Acceptance22







15Strategy Interoperability33







16Strategy Integration33







17Strategy Ontopiness44







18Security Protecting data23







19Security Loss of Data44







20Security Darknet11







21Security Trust Infrastructure44








FYI: this is the spreadsheet where all your input will be copied and visualised:

View file
name20240708 T7 Risk Assessment v1.2.xlsx
height150