Advanced notice :
We will be upgrading wiki.geant.org from the current version of Confluence Server to the current LTS version 8.5. During the maintenance window we expect that there will be an outage of 20 minutes.
Maintenance start time: 22/10/2024 16:00 UTC. Maintenance end time: 22/10/2024 18:00 UTC.
Homework for all T7 experts
- please "claim" a row in both tables below by replacing "xx" with your initials
- fill in your assessment regarding probability and damage of the risks as per the risk assessment page up one level
- find the categorisation and code copied below:
Probability of occurrence | Potential damage |
---|---|
1 == once in 10 years 2 == once in 5 years 3 == once in 2 years 4 ==once in 1 years 5 ==many times in a year | 1 == Low 2 == Medium 3 == High 4 == Very high |
The "probability" table
Risk # | Risk name | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. | Prob. |
[1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | [1 - 5] | ||
Expert | CG | AA | xx | xx | xx | xx | xx | xx | xx | xx | |
1 | Fin GAFAM | 5 | 5 | ||||||||
2 | Fin Technology | 5 | 5 | ||||||||
3 | Fin Marketing | 4 | 5 | ||||||||
4 | Fin Environmental Cost | 1 | 1 | ||||||||
5 | Fin Funding | 4 | 3 | ||||||||
6 | Legal Governments | 3 | 2 | ||||||||
7 | Legal Compatibility | 3 | 3 | ||||||||
8 | Legal DID misuse | 5 | 5 | ||||||||
9 | Legal User responsibility | 5 | 5 | ||||||||
10 | Strategy Dependency | 5 | 5 | ||||||||
11 | Strategy Intermediaries | 4 | 4 | ||||||||
12 | Strategy Exposure | 5 | 5 | ||||||||
13 | Strategy Usability | 5 | 5 | ||||||||
14 | Strategy Acceptance | 5 | 5 | ||||||||
15 | Strategy Interoperability | 3 | 3 | ||||||||
16 | Strategy Integration | 3 | 3 | ||||||||
17 | Strategy Ontopiness | 3 | 3 | ||||||||
18 | Security Protecting data | 5 | 5 | ||||||||
19 | Security Loss of Data | 5 | 5 | ||||||||
20 | Security Darknet | 3 | 3 | ||||||||
21 | Security Trust Infrastructure | 2 | 2 |
The "damage" table
Risk # | Risk name | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. | Dam. |
[1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | [1 - 4] | ||
Expert | CG | AA | xx | xx | xx | xx | xx | xx | xx | xx | |
1 | Fin GAFAM | 4 | 4 | ||||||||
2 | Fin Technology | 1 | 2 | ||||||||
3 | Fin Marketing | 3 | 4 | ||||||||
4 | Fin Environmental Cost | 1 | 1 | ||||||||
5 | Fin Funding | 2 | 3 | ||||||||
6 | Legal Governments | 3 | 4 | ||||||||
7 | Legal Compatibility | 3 | 3 | ||||||||
8 | Legal DID misuse | 2 | 3 | ||||||||
9 | Legal User responsibility | 3 | 3 | ||||||||
10 | Strategy Dependency | 2 | 2 | ||||||||
11 | Strategy Intermediaries | 3 | 3 | ||||||||
12 | Strategy Exposure | 1 | 4 | ||||||||
13 | Strategy Usability | 2 | 3 | ||||||||
14 | Strategy Acceptance | 2 | 2 | ||||||||
15 | Strategy Interoperability | 3 | 3 | ||||||||
16 | Strategy Integration | 3 | 3 | ||||||||
17 | Strategy Ontopiness | 4 | 4 | ||||||||
18 | Security Protecting data | 2 | 3 | ||||||||
19 | Security Loss of Data | 4 | 4 | ||||||||
20 | Security Darknet | 1 | 1 | ||||||||
21 | Security Trust Infrastructure | 4 | 4 |