Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • please "claim" a row in both tables below by replacing "xx" with your initials
  • fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
  • for simplicity reasons, find the categorisation and code copied below:
Probability of occurrence Potential damage

1 == once in 10 years

2 == once in 5 years

3 == once in 2 years

4 ==once in 1 years

5 ==many times in a year

1 == Low   

2 == Medium

3 == High

4 == Very high

The "probability" table

Risk #Risk nameProb.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.Prob.


[1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5][1 - 5]

ExpertCGAA
xx
ERxxxxxxxxxxxxxx
1Fin GAFAM555






2Fin Technology555






3Fin Marketing455






4Fin Environmental Cost112






5Fin Funding433






6Legal Governments 323






7Legal Compatibility333






8Legal DID misuse555






9Legal User responsibility555






10Strategy Dependency555






11Strategy Intermediaries444






12Strategy Exposure555






13Strategy Usability555






14Strategy Acceptance555






15Strategy Interoperability333






16Strategy Integration333






17Strategy Ontopiness333






18Security Protecting data555






19Security Loss of Data555






20Security Darknet333






21Security Trust Infrastructure222








The "damage" table

Risk #Risk nameDam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.Dam.


[1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4][1 - 4]

ExpertCGAA
xx
ERxxxxxxxxxxxxxx
1Fin GAFAM444






2Fin Technology122






3Fin Marketing344






4Fin Environmental Cost111






5Fin Funding233






6Legal Governments 344






7Legal Compatibility333






8Legal DID misuse233






9Legal User responsibility333






10Strategy Dependency222






11Strategy Intermediaries333






12Strategy Exposure144






13Strategy Usability233






14Strategy Acceptance222






15Strategy Interoperability333






16Strategy Integration333






17Strategy Ontopiness444






18Security Protecting data233






19Security Loss of Data444






20Security Darknet111






21Security Trust Infrastructure444







FYI: this is the spreadsheet where all your input will be copied and visualised:

View file
name20240708 T7 Risk Assessment v1.2.xlsx
height150